General

  • Target

    04a83e0d8f086893551bef322198299d73365c173636f50ce90824d21d0a71f1

  • Size

    176KB

  • Sample

    220212-nfezlsbff5

  • MD5

    9217349a4d804dafd1df73c94d442a82

  • SHA1

    0635a8d1ab9c529f598931f85d90f609851a59cc

  • SHA256

    04a83e0d8f086893551bef322198299d73365c173636f50ce90824d21d0a71f1

  • SHA512

    4fdbb6b96f9c2f8fc7a3822bf86252ffcedcce6cc6f6b792166ef9d297315ba994725c09ef91fe9b2ca44cba69cbb111134b05287737f88f81ba0430f03325e0

Malware Config

Targets

    • Target

      04a83e0d8f086893551bef322198299d73365c173636f50ce90824d21d0a71f1

    • Size

      176KB

    • MD5

      9217349a4d804dafd1df73c94d442a82

    • SHA1

      0635a8d1ab9c529f598931f85d90f609851a59cc

    • SHA256

      04a83e0d8f086893551bef322198299d73365c173636f50ce90824d21d0a71f1

    • SHA512

      4fdbb6b96f9c2f8fc7a3822bf86252ffcedcce6cc6f6b792166ef9d297315ba994725c09ef91fe9b2ca44cba69cbb111134b05287737f88f81ba0430f03325e0

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks