General

  • Target

    038ff3bf3823d31da044955ad9cd8207e859321ea6c221d9e2d5ef982a2b70d0

  • Size

    192KB

  • Sample

    220212-nv861abhc3

  • MD5

    b05342e1d6340795786810fab8c08322

  • SHA1

    53b3483add91981e441d99ef4e49946906cd7026

  • SHA256

    038ff3bf3823d31da044955ad9cd8207e859321ea6c221d9e2d5ef982a2b70d0

  • SHA512

    9ec4a97f39e2f9b5add8f99bb7c35e5aaef60c68437493b1de7616bba2270caa7011a89a10d44140ebb3e01055ed98b344febdcf6aff9ff352f72fab118debae

Malware Config

Targets

    • Target

      038ff3bf3823d31da044955ad9cd8207e859321ea6c221d9e2d5ef982a2b70d0

    • Size

      192KB

    • MD5

      b05342e1d6340795786810fab8c08322

    • SHA1

      53b3483add91981e441d99ef4e49946906cd7026

    • SHA256

      038ff3bf3823d31da044955ad9cd8207e859321ea6c221d9e2d5ef982a2b70d0

    • SHA512

      9ec4a97f39e2f9b5add8f99bb7c35e5aaef60c68437493b1de7616bba2270caa7011a89a10d44140ebb3e01055ed98b344febdcf6aff9ff352f72fab118debae

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks