General

  • Target

    04982e0b1724b7c7cd4ec201ed8ef6e1031cab3ad1a400d5708434eee14f603d

  • Size

    192KB

  • Sample

    220212-ngg6csddbj

  • MD5

    9e7b50310343352f7cf2d98adf39c886

  • SHA1

    6ed340836e1c41fd7a04475462443b48a37f2c00

  • SHA256

    04982e0b1724b7c7cd4ec201ed8ef6e1031cab3ad1a400d5708434eee14f603d

  • SHA512

    e71b0cdfbd5fde4e9361e7297ae1427f46c6d6249c755c91d7086870f48f585cb1d12758757615fad0ad805c267f6a69e7e77e624606031dd2ec3942b202ffbb

Malware Config

Targets

    • Target

      04982e0b1724b7c7cd4ec201ed8ef6e1031cab3ad1a400d5708434eee14f603d

    • Size

      192KB

    • MD5

      9e7b50310343352f7cf2d98adf39c886

    • SHA1

      6ed340836e1c41fd7a04475462443b48a37f2c00

    • SHA256

      04982e0b1724b7c7cd4ec201ed8ef6e1031cab3ad1a400d5708434eee14f603d

    • SHA512

      e71b0cdfbd5fde4e9361e7297ae1427f46c6d6249c755c91d7086870f48f585cb1d12758757615fad0ad805c267f6a69e7e77e624606031dd2ec3942b202ffbb

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks