General

  • Target

    048b44ffa904c7420c4f74629b585de101f38e84387186fcbe64f6c933d6c953

  • Size

    99KB

  • Sample

    220212-ng1ygaddbn

  • MD5

    0a02e96ee0126427ffbeb69acdd41a2f

  • SHA1

    a6f5cad892b065111acdd2062e9df1fae2e94cf6

  • SHA256

    048b44ffa904c7420c4f74629b585de101f38e84387186fcbe64f6c933d6c953

  • SHA512

    cb7e4b520c678bf2d6e4278f052c718e59deb509cceadc071881ae4f45d78ee23d2ea4b8e2a7d4d670173143ec27b0563134c926f90970f4d30120be611c4672

Malware Config

Targets

    • Target

      048b44ffa904c7420c4f74629b585de101f38e84387186fcbe64f6c933d6c953

    • Size

      99KB

    • MD5

      0a02e96ee0126427ffbeb69acdd41a2f

    • SHA1

      a6f5cad892b065111acdd2062e9df1fae2e94cf6

    • SHA256

      048b44ffa904c7420c4f74629b585de101f38e84387186fcbe64f6c933d6c953

    • SHA512

      cb7e4b520c678bf2d6e4278f052c718e59deb509cceadc071881ae4f45d78ee23d2ea4b8e2a7d4d670173143ec27b0563134c926f90970f4d30120be611c4672

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks