General

  • Target

    047c931cdebed77fd23f96be5c57a7c530e7655cb07929cff23cca940507201f

  • Size

    99KB

  • Sample

    220212-nhvg3sddcm

  • MD5

    a6eafc33694684c931199e9e771ea682

  • SHA1

    fb75e275fa6f8d6bda54681730a34f4afce4e56b

  • SHA256

    047c931cdebed77fd23f96be5c57a7c530e7655cb07929cff23cca940507201f

  • SHA512

    b5e8f7acba1607419f20e9e1065618c4e1f8456508aec3a746ca6f8cf6f7ded351603173a5799ef49409f717987feb364d2febc36b77d6729dfeae4f446dd5cf

Malware Config

Targets

    • Target

      047c931cdebed77fd23f96be5c57a7c530e7655cb07929cff23cca940507201f

    • Size

      99KB

    • MD5

      a6eafc33694684c931199e9e771ea682

    • SHA1

      fb75e275fa6f8d6bda54681730a34f4afce4e56b

    • SHA256

      047c931cdebed77fd23f96be5c57a7c530e7655cb07929cff23cca940507201f

    • SHA512

      b5e8f7acba1607419f20e9e1065618c4e1f8456508aec3a746ca6f8cf6f7ded351603173a5799ef49409f717987feb364d2febc36b77d6729dfeae4f446dd5cf

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks