General

  • Target

    049d9f2d09003868d4f9edfd4b59879923fe015a49c7ba6c8b09425281bc208e

  • Size

    79KB

  • Sample

    220212-nf245sbfg4

  • MD5

    e71cf695dc2ede31695e014cb16eaee2

  • SHA1

    7500a8aea81167d4a0582af02e10200eefea5f5c

  • SHA256

    049d9f2d09003868d4f9edfd4b59879923fe015a49c7ba6c8b09425281bc208e

  • SHA512

    7175ab482048e34a5c40281080998942615bca8bfe4583e9541b7278db837a8d49c153ababd29e9a518f404f370afe76a7c4d622fc753e4c528ea37475bbb473

Malware Config

Targets

    • Target

      049d9f2d09003868d4f9edfd4b59879923fe015a49c7ba6c8b09425281bc208e

    • Size

      79KB

    • MD5

      e71cf695dc2ede31695e014cb16eaee2

    • SHA1

      7500a8aea81167d4a0582af02e10200eefea5f5c

    • SHA256

      049d9f2d09003868d4f9edfd4b59879923fe015a49c7ba6c8b09425281bc208e

    • SHA512

      7175ab482048e34a5c40281080998942615bca8bfe4583e9541b7278db837a8d49c153ababd29e9a518f404f370afe76a7c4d622fc753e4c528ea37475bbb473

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks