General

  • Target

    047aa570d4c77a8cd4fa59b357ba2ed40f39b54665eb87c3e82023a3c3524d96

  • Size

    168KB

  • Sample

    220212-nh4ezsbga5

  • MD5

    0ec244048ed30d7c9354f3551a9fe862

  • SHA1

    5e922039669b38290890c7044a257ceee317bef1

  • SHA256

    047aa570d4c77a8cd4fa59b357ba2ed40f39b54665eb87c3e82023a3c3524d96

  • SHA512

    0908cb7201b31cb4d894c6d1bab732bfdb4907c9c814abdf48f62a4602806577be7b28a528b61ebcf5b747e9adafd6a23236977d41af727c847ed318b9a6e8a8

Malware Config

Targets

    • Target

      047aa570d4c77a8cd4fa59b357ba2ed40f39b54665eb87c3e82023a3c3524d96

    • Size

      168KB

    • MD5

      0ec244048ed30d7c9354f3551a9fe862

    • SHA1

      5e922039669b38290890c7044a257ceee317bef1

    • SHA256

      047aa570d4c77a8cd4fa59b357ba2ed40f39b54665eb87c3e82023a3c3524d96

    • SHA512

      0908cb7201b31cb4d894c6d1bab732bfdb4907c9c814abdf48f62a4602806577be7b28a528b61ebcf5b747e9adafd6a23236977d41af727c847ed318b9a6e8a8

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks