General

  • Target

    0480a6ad293b89b476a34688a9efa2705679966d65a4348fa2d2557a4b7d4275

  • Size

    216KB

  • Sample

    220212-nhjetabfh9

  • MD5

    04a508faeef34767b9f850006e9081f9

  • SHA1

    72a92136de895e3790c1d4558ca4127a520c092c

  • SHA256

    0480a6ad293b89b476a34688a9efa2705679966d65a4348fa2d2557a4b7d4275

  • SHA512

    c0555a83b676444da5648b046a5802a5c2e5c0aaf420e8f07dc74792aea00ce04131cf45c01fbf48b6be21331f6d2f10ad790bd4d532017942e1a4b0f4a8193d

Malware Config

Targets

    • Target

      0480a6ad293b89b476a34688a9efa2705679966d65a4348fa2d2557a4b7d4275

    • Size

      216KB

    • MD5

      04a508faeef34767b9f850006e9081f9

    • SHA1

      72a92136de895e3790c1d4558ca4127a520c092c

    • SHA256

      0480a6ad293b89b476a34688a9efa2705679966d65a4348fa2d2557a4b7d4275

    • SHA512

      c0555a83b676444da5648b046a5802a5c2e5c0aaf420e8f07dc74792aea00ce04131cf45c01fbf48b6be21331f6d2f10ad790bd4d532017942e1a4b0f4a8193d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks