General

  • Target

    04febef830732ae91908ad41a55c2ac8c8972cf0d584411afd7d7fc22c8da5c6

  • Size

    191KB

  • Sample

    220212-nbdwrabfc2

  • MD5

    fb879a17cc26940b811ddef9fee58595

  • SHA1

    f448ab673d73f6f9a065d1150c466e526443ad22

  • SHA256

    04febef830732ae91908ad41a55c2ac8c8972cf0d584411afd7d7fc22c8da5c6

  • SHA512

    0483141027c7fcbc89fb75e0e9c1532fd53496f9a98a429e0222141ec522ff16f11b6022b8613b20146548dc0e7603b7a5bcf2e11379d1f03934627a45b80c13

Malware Config

Targets

    • Target

      04febef830732ae91908ad41a55c2ac8c8972cf0d584411afd7d7fc22c8da5c6

    • Size

      191KB

    • MD5

      fb879a17cc26940b811ddef9fee58595

    • SHA1

      f448ab673d73f6f9a065d1150c466e526443ad22

    • SHA256

      04febef830732ae91908ad41a55c2ac8c8972cf0d584411afd7d7fc22c8da5c6

    • SHA512

      0483141027c7fcbc89fb75e0e9c1532fd53496f9a98a429e0222141ec522ff16f11b6022b8613b20146548dc0e7603b7a5bcf2e11379d1f03934627a45b80c13

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks