General

  • Target

    003f2f75faeb4947e207cab89323392c5e2bf869152f7a8a67e16c978932056b

  • Size

    99KB

  • Sample

    220212-p2r2qsecap

  • MD5

    797fa82b5d6824b1600e0a9570e0618a

  • SHA1

    f5b6db72c6a9c4fc1cb4303b6146511dca736069

  • SHA256

    003f2f75faeb4947e207cab89323392c5e2bf869152f7a8a67e16c978932056b

  • SHA512

    51245a8264f0d7bc0e94695a1c67e0e00fd76c1fef2521da589a9e27c42de6f9ba0602e2345e38a2dc482802b6760bfe90ef41f5530dd483325cba6d087c1808

Malware Config

Targets

    • Target

      003f2f75faeb4947e207cab89323392c5e2bf869152f7a8a67e16c978932056b

    • Size

      99KB

    • MD5

      797fa82b5d6824b1600e0a9570e0618a

    • SHA1

      f5b6db72c6a9c4fc1cb4303b6146511dca736069

    • SHA256

      003f2f75faeb4947e207cab89323392c5e2bf869152f7a8a67e16c978932056b

    • SHA512

      51245a8264f0d7bc0e94695a1c67e0e00fd76c1fef2521da589a9e27c42de6f9ba0602e2345e38a2dc482802b6760bfe90ef41f5530dd483325cba6d087c1808

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks