General

  • Target

    042941654aadbf1f63aea7b140ca920f03aa4c6b33e916b4f12d24333eecf51e

  • Size

    101KB

  • Sample

    220212-nnjyjabgd7

  • MD5

    0c424f32b6d05ffdd602b332d4fdd003

  • SHA1

    65f7ae0b3ce717daeb42703f410b216f2b79ce97

  • SHA256

    042941654aadbf1f63aea7b140ca920f03aa4c6b33e916b4f12d24333eecf51e

  • SHA512

    0efeb5a19a611db77b12defb010c78a1ae8da8e366355f15ffea605d15262e22aaf05638dda224864a364c9106b6ee65b33a32d5a06714d34f06a0195bf6a523

Malware Config

Targets

    • Target

      042941654aadbf1f63aea7b140ca920f03aa4c6b33e916b4f12d24333eecf51e

    • Size

      101KB

    • MD5

      0c424f32b6d05ffdd602b332d4fdd003

    • SHA1

      65f7ae0b3ce717daeb42703f410b216f2b79ce97

    • SHA256

      042941654aadbf1f63aea7b140ca920f03aa4c6b33e916b4f12d24333eecf51e

    • SHA512

      0efeb5a19a611db77b12defb010c78a1ae8da8e366355f15ffea605d15262e22aaf05638dda224864a364c9106b6ee65b33a32d5a06714d34f06a0195bf6a523

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks