General

  • Target

    03ff4425d448f73790c0862b31077b73edc8fd495693b65edced71f81172516f

  • Size

    80KB

  • Sample

    220212-np4pbsbgf6

  • MD5

    51d095f7075989f88c6cf1be8b18edd9

  • SHA1

    846f0ada2cc2006f6f6d8e239437d4f25e170f6f

  • SHA256

    03ff4425d448f73790c0862b31077b73edc8fd495693b65edced71f81172516f

  • SHA512

    2d740f853dfd47a2bb45bbea324eb1b2559c09f93dd3aab71dc80a5783789fd9eef36dde22120f7f2b0baf3a9bc352c477c86b7c13d5f9f5fdd279af3827af2b

Malware Config

Targets

    • Target

      03ff4425d448f73790c0862b31077b73edc8fd495693b65edced71f81172516f

    • Size

      80KB

    • MD5

      51d095f7075989f88c6cf1be8b18edd9

    • SHA1

      846f0ada2cc2006f6f6d8e239437d4f25e170f6f

    • SHA256

      03ff4425d448f73790c0862b31077b73edc8fd495693b65edced71f81172516f

    • SHA512

      2d740f853dfd47a2bb45bbea324eb1b2559c09f93dd3aab71dc80a5783789fd9eef36dde22120f7f2b0baf3a9bc352c477c86b7c13d5f9f5fdd279af3827af2b

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks