General

  • Target

    047b7a125a5d18aa80e11efa37727317366153de2bb249284d8e252f13f1fe26

  • Size

    99KB

  • Sample

    220212-nhzf2abga3

  • MD5

    2f1f8cad2767a5249a6c849908f1b778

  • SHA1

    97be2a02e2f2fc28fb9926e278ff10d68c1100af

  • SHA256

    047b7a125a5d18aa80e11efa37727317366153de2bb249284d8e252f13f1fe26

  • SHA512

    43cac78f990db6f8cccbd55ff42838558cd8a9693e434672ebe66a7ba9498075eae6dc0d70cd8aff7169edc40fb73cbba24a862382513a0635869cc484ca60cf

Malware Config

Targets

    • Target

      047b7a125a5d18aa80e11efa37727317366153de2bb249284d8e252f13f1fe26

    • Size

      99KB

    • MD5

      2f1f8cad2767a5249a6c849908f1b778

    • SHA1

      97be2a02e2f2fc28fb9926e278ff10d68c1100af

    • SHA256

      047b7a125a5d18aa80e11efa37727317366153de2bb249284d8e252f13f1fe26

    • SHA512

      43cac78f990db6f8cccbd55ff42838558cd8a9693e434672ebe66a7ba9498075eae6dc0d70cd8aff7169edc40fb73cbba24a862382513a0635869cc484ca60cf

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks