General

  • Target

    040884948eb776dc1be2d79577b71dc39aa424699d272365b005680a0a7ffd72

  • Size

    176KB

  • Sample

    220212-npl5aabgf2

  • MD5

    d7ae7777e225268781459f9fd50c12f7

  • SHA1

    844fdddb22c6e8a5d1216a5eca3e7466f18d4281

  • SHA256

    040884948eb776dc1be2d79577b71dc39aa424699d272365b005680a0a7ffd72

  • SHA512

    8eb1e69559325c713bb752510043fa0c87847a49ccb585de4f819276edcd455f579df447c57b9db527b7e5551ea8ec11a5db0e2471f8df1e4d9811da9c1fd3a3

Malware Config

Targets

    • Target

      040884948eb776dc1be2d79577b71dc39aa424699d272365b005680a0a7ffd72

    • Size

      176KB

    • MD5

      d7ae7777e225268781459f9fd50c12f7

    • SHA1

      844fdddb22c6e8a5d1216a5eca3e7466f18d4281

    • SHA256

      040884948eb776dc1be2d79577b71dc39aa424699d272365b005680a0a7ffd72

    • SHA512

      8eb1e69559325c713bb752510043fa0c87847a49ccb585de4f819276edcd455f579df447c57b9db527b7e5551ea8ec11a5db0e2471f8df1e4d9811da9c1fd3a3

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks