General

  • Target

    03973b4784c7df663545e8018a44f3d97eed1dacb58d5656e529c4fa4ba7317f

  • Size

    176KB

  • Sample

    220212-nvqdwsbhb8

  • MD5

    e90895cb872cb0665d7bc8316dfd6420

  • SHA1

    1271ebf9ba57728bc81faf27845f941cd21b0300

  • SHA256

    03973b4784c7df663545e8018a44f3d97eed1dacb58d5656e529c4fa4ba7317f

  • SHA512

    99ae0d9a00d7742dc29519d467a144c7d8913971c3a639f244670019a409d0b151e55eb5a6f862bf22bc39a1424507b7892d532a8ad08b105674185692d362d6

Malware Config

Targets

    • Target

      03973b4784c7df663545e8018a44f3d97eed1dacb58d5656e529c4fa4ba7317f

    • Size

      176KB

    • MD5

      e90895cb872cb0665d7bc8316dfd6420

    • SHA1

      1271ebf9ba57728bc81faf27845f941cd21b0300

    • SHA256

      03973b4784c7df663545e8018a44f3d97eed1dacb58d5656e529c4fa4ba7317f

    • SHA512

      99ae0d9a00d7742dc29519d467a144c7d8913971c3a639f244670019a409d0b151e55eb5a6f862bf22bc39a1424507b7892d532a8ad08b105674185692d362d6

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks