General

  • Target

    05132eed5065552a3be2cc40346bff127455896954935b8b2c8beba39c027e0a

  • Size

    101KB

  • Sample

    220212-naplvsbfa9

  • MD5

    6af5b78e7507583e68812c3c3a96ff01

  • SHA1

    0ae8898672017046ad6a8648c3d27d13f43c7ad4

  • SHA256

    05132eed5065552a3be2cc40346bff127455896954935b8b2c8beba39c027e0a

  • SHA512

    ba24ee8326a4b574f42eb4525a79c35538645ce9041cb71330cd8da210358c3d4dfea4a728f7dc8068fd60ae3e44f255ea513cef81a364ef4893d79b7a40bd02

Malware Config

Targets

    • Target

      05132eed5065552a3be2cc40346bff127455896954935b8b2c8beba39c027e0a

    • Size

      101KB

    • MD5

      6af5b78e7507583e68812c3c3a96ff01

    • SHA1

      0ae8898672017046ad6a8648c3d27d13f43c7ad4

    • SHA256

      05132eed5065552a3be2cc40346bff127455896954935b8b2c8beba39c027e0a

    • SHA512

      ba24ee8326a4b574f42eb4525a79c35538645ce9041cb71330cd8da210358c3d4dfea4a728f7dc8068fd60ae3e44f255ea513cef81a364ef4893d79b7a40bd02

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks