General

  • Target

    03745f1941e6a2cfab3888f76abc5557af23aec8fd1867ae23aa47bd07017e41

  • Size

    101KB

  • Sample

    220212-nxfx8sdfbn

  • MD5

    b3b9032ffc3469c3de6dc5915eff1eac

  • SHA1

    990f43d52bfe2aea6213c06f102bc04359a6c468

  • SHA256

    03745f1941e6a2cfab3888f76abc5557af23aec8fd1867ae23aa47bd07017e41

  • SHA512

    c54f6b10dac50ce8aa1351f9444bed3e0ab2463e7d304e2fbc0fecc5497f9b650c054996afd021e62bd25eba22b41476bf2164aca1860b6cfb48cf1a8435964e

Malware Config

Targets

    • Target

      03745f1941e6a2cfab3888f76abc5557af23aec8fd1867ae23aa47bd07017e41

    • Size

      101KB

    • MD5

      b3b9032ffc3469c3de6dc5915eff1eac

    • SHA1

      990f43d52bfe2aea6213c06f102bc04359a6c468

    • SHA256

      03745f1941e6a2cfab3888f76abc5557af23aec8fd1867ae23aa47bd07017e41

    • SHA512

      c54f6b10dac50ce8aa1351f9444bed3e0ab2463e7d304e2fbc0fecc5497f9b650c054996afd021e62bd25eba22b41476bf2164aca1860b6cfb48cf1a8435964e

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks