General

  • Target

    04b7d89a90d733d3dc7195349212dbff514520f2bf6898c2070617eacafac490

  • Size

    79KB

  • Sample

    220212-nexs2abff2

  • MD5

    d7ab3ffe61d0a3e4dc4c83ead9dd042b

  • SHA1

    05e60bd5d2aff88057aa493470574f3e798a8a65

  • SHA256

    04b7d89a90d733d3dc7195349212dbff514520f2bf6898c2070617eacafac490

  • SHA512

    e61b1101bd826991dfa782bf183500723d9267fa5e4b203f24a63437a4ce93154308ff4fb3cd70f0eb268df2b93ae4bf8e1405b1b475fe3ba811e27ac4029298

Malware Config

Targets

    • Target

      04b7d89a90d733d3dc7195349212dbff514520f2bf6898c2070617eacafac490

    • Size

      79KB

    • MD5

      d7ab3ffe61d0a3e4dc4c83ead9dd042b

    • SHA1

      05e60bd5d2aff88057aa493470574f3e798a8a65

    • SHA256

      04b7d89a90d733d3dc7195349212dbff514520f2bf6898c2070617eacafac490

    • SHA512

      e61b1101bd826991dfa782bf183500723d9267fa5e4b203f24a63437a4ce93154308ff4fb3cd70f0eb268df2b93ae4bf8e1405b1b475fe3ba811e27ac4029298

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks