General

  • Target

    048d88ec4a11ef316f3a5a951db037c459a4aed4231133d98685030db33ac143

  • Size

    101KB

  • Sample

    220212-ngwnrabfh3

  • MD5

    bfb6af0c5cc8fd9a1c6fd4b3d0c13b58

  • SHA1

    211258e12dcad14f46c3dd9b0deb0aeb04edcf10

  • SHA256

    048d88ec4a11ef316f3a5a951db037c459a4aed4231133d98685030db33ac143

  • SHA512

    f0c14c8f4975471624070e0a98067b48e731af953513c22c37479b822b921e16edb8affacadec7126e6f7221c02542fb55568deec0349da34a5c94b805f35f4d

Malware Config

Targets

    • Target

      048d88ec4a11ef316f3a5a951db037c459a4aed4231133d98685030db33ac143

    • Size

      101KB

    • MD5

      bfb6af0c5cc8fd9a1c6fd4b3d0c13b58

    • SHA1

      211258e12dcad14f46c3dd9b0deb0aeb04edcf10

    • SHA256

      048d88ec4a11ef316f3a5a951db037c459a4aed4231133d98685030db33ac143

    • SHA512

      f0c14c8f4975471624070e0a98067b48e731af953513c22c37479b822b921e16edb8affacadec7126e6f7221c02542fb55568deec0349da34a5c94b805f35f4d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks