General

  • Target

    03e9940ab91f9c111920d0737ee7482cfc75cf2570f98dbebc357c261c462f51

  • Size

    99KB

  • Sample

    220212-nrd7fsbgg8

  • MD5

    44a77e815f7f7c1cd82af396fee37bdf

  • SHA1

    4bd37d470949caf948da3aeecaba59f1f163d85d

  • SHA256

    03e9940ab91f9c111920d0737ee7482cfc75cf2570f98dbebc357c261c462f51

  • SHA512

    0d73166d7cc9420bee201e0d43b4d1ee48e6a5f835261a55d273d642bed29ec11534fd8ab6ab84c0fadb3cb842da68acf3c7caa3f3d5cce6903fcdd4ab64bbf2

Malware Config

Targets

    • Target

      03e9940ab91f9c111920d0737ee7482cfc75cf2570f98dbebc357c261c462f51

    • Size

      99KB

    • MD5

      44a77e815f7f7c1cd82af396fee37bdf

    • SHA1

      4bd37d470949caf948da3aeecaba59f1f163d85d

    • SHA256

      03e9940ab91f9c111920d0737ee7482cfc75cf2570f98dbebc357c261c462f51

    • SHA512

      0d73166d7cc9420bee201e0d43b4d1ee48e6a5f835261a55d273d642bed29ec11534fd8ab6ab84c0fadb3cb842da68acf3c7caa3f3d5cce6903fcdd4ab64bbf2

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks