General

  • Target

    03ecc866babf139fa3cb080196c55a80b40d22f7cdd820bbc7f05d0d83f44b39

  • Size

    101KB

  • Sample

    220212-nq735sbgg5

  • MD5

    9bfa78537fbcad9b65a38f7556b467d6

  • SHA1

    049733d1d4efaff801e8d869ff0aa9eb7925ed48

  • SHA256

    03ecc866babf139fa3cb080196c55a80b40d22f7cdd820bbc7f05d0d83f44b39

  • SHA512

    3c62d58a4a604e2dc7907327b8b817b96322abe17caf1359afd09dd98fddf28f9e9c2ec90f76af66093548139b50e77c1bf41223be5c471e5570cfcbf04351ff

Malware Config

Targets

    • Target

      03ecc866babf139fa3cb080196c55a80b40d22f7cdd820bbc7f05d0d83f44b39

    • Size

      101KB

    • MD5

      9bfa78537fbcad9b65a38f7556b467d6

    • SHA1

      049733d1d4efaff801e8d869ff0aa9eb7925ed48

    • SHA256

      03ecc866babf139fa3cb080196c55a80b40d22f7cdd820bbc7f05d0d83f44b39

    • SHA512

      3c62d58a4a604e2dc7907327b8b817b96322abe17caf1359afd09dd98fddf28f9e9c2ec90f76af66093548139b50e77c1bf41223be5c471e5570cfcbf04351ff

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks