General

  • Target

    0516c3537c656ab8c51980b95e9d57c3f636bcee16457701fa6869101860d832

  • Size

    80KB

  • Sample

    220212-nahhjsbfa7

  • MD5

    ec63e662b4e72d4278cdc0153a0b62cb

  • SHA1

    bfc0e6f8fc02822452f88c0a14abcdab1321f2cf

  • SHA256

    0516c3537c656ab8c51980b95e9d57c3f636bcee16457701fa6869101860d832

  • SHA512

    c59cea00a61d3e8bfcfe56fc7f4d83620ef4a9835a55fa1339dcb9d797dee651ee379bb0e02d39a8047e463901b5a80f21007dbf2bd0d0223bcb861057724678

Malware Config

Targets

    • Target

      0516c3537c656ab8c51980b95e9d57c3f636bcee16457701fa6869101860d832

    • Size

      80KB

    • MD5

      ec63e662b4e72d4278cdc0153a0b62cb

    • SHA1

      bfc0e6f8fc02822452f88c0a14abcdab1321f2cf

    • SHA256

      0516c3537c656ab8c51980b95e9d57c3f636bcee16457701fa6869101860d832

    • SHA512

      c59cea00a61d3e8bfcfe56fc7f4d83620ef4a9835a55fa1339dcb9d797dee651ee379bb0e02d39a8047e463901b5a80f21007dbf2bd0d0223bcb861057724678

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks