General

  • Target

    0506462839f8a49068ec82421cc9cf118005708da5b14b5cfe1a201223bdf22f

  • Size

    192KB

  • Sample

    220212-na3tgsbfb6

  • MD5

    feb933eb1add8e4280d5212cd0578f48

  • SHA1

    b9eb2f6aafc3eef61031f217f710aed39bf6429c

  • SHA256

    0506462839f8a49068ec82421cc9cf118005708da5b14b5cfe1a201223bdf22f

  • SHA512

    5d292a952d8717a4889ec571abdc0dda2645cb41883fba598055ce51a89263ab8a63d735d8df4cc98f616f2d43d0fdae67e073b0fcebaccb1d4f1321358ef039

Malware Config

Targets

    • Target

      0506462839f8a49068ec82421cc9cf118005708da5b14b5cfe1a201223bdf22f

    • Size

      192KB

    • MD5

      feb933eb1add8e4280d5212cd0578f48

    • SHA1

      b9eb2f6aafc3eef61031f217f710aed39bf6429c

    • SHA256

      0506462839f8a49068ec82421cc9cf118005708da5b14b5cfe1a201223bdf22f

    • SHA512

      5d292a952d8717a4889ec571abdc0dda2645cb41883fba598055ce51a89263ab8a63d735d8df4cc98f616f2d43d0fdae67e073b0fcebaccb1d4f1321358ef039

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks