General

  • Target

    042e4c07c8507b7c3d0804f2084125ceb78e43fdc53918d2eb801716a4e38f03

  • Size

    80KB

  • Sample

    220212-nm4ljsbgd5

  • MD5

    7feadbd8f648090e2c3cb1d63ef4ac8b

  • SHA1

    3f5c7d7b2d4814a1156be57c74a3685bc7786bf7

  • SHA256

    042e4c07c8507b7c3d0804f2084125ceb78e43fdc53918d2eb801716a4e38f03

  • SHA512

    06e0434efd8a9cac4e2a528ce600a66b8b43452b2180dfa552408f6178482c653ec0962ac6f5045a1f07f8066324dd616a4b9c34c3d9e17e7cbda904138dc3e2

Malware Config

Targets

    • Target

      042e4c07c8507b7c3d0804f2084125ceb78e43fdc53918d2eb801716a4e38f03

    • Size

      80KB

    • MD5

      7feadbd8f648090e2c3cb1d63ef4ac8b

    • SHA1

      3f5c7d7b2d4814a1156be57c74a3685bc7786bf7

    • SHA256

      042e4c07c8507b7c3d0804f2084125ceb78e43fdc53918d2eb801716a4e38f03

    • SHA512

      06e0434efd8a9cac4e2a528ce600a66b8b43452b2180dfa552408f6178482c653ec0962ac6f5045a1f07f8066324dd616a4b9c34c3d9e17e7cbda904138dc3e2

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks