General

  • Target

    04d50dba13380a4d544ccb7485d680b42e0362e7207a3504f11da9c2e21f072f

  • Size

    79KB

  • Sample

    220212-nc2n7sdcfm

  • MD5

    2db9096916b587017be8ce7fa74f7b3c

  • SHA1

    84e82086711d825808c7313289ef7ef89669e2d7

  • SHA256

    04d50dba13380a4d544ccb7485d680b42e0362e7207a3504f11da9c2e21f072f

  • SHA512

    30a01d7398dbb6d95d75f7b778fe8f07cece66bea9037c9754995659f3c36552d199b23290ce4b88892e1938b377a3d1b69b048644ab19de8ea56b6675e38af8

Malware Config

Targets

    • Target

      04d50dba13380a4d544ccb7485d680b42e0362e7207a3504f11da9c2e21f072f

    • Size

      79KB

    • MD5

      2db9096916b587017be8ce7fa74f7b3c

    • SHA1

      84e82086711d825808c7313289ef7ef89669e2d7

    • SHA256

      04d50dba13380a4d544ccb7485d680b42e0362e7207a3504f11da9c2e21f072f

    • SHA512

      30a01d7398dbb6d95d75f7b778fe8f07cece66bea9037c9754995659f3c36552d199b23290ce4b88892e1938b377a3d1b69b048644ab19de8ea56b6675e38af8

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks