General

  • Target

    026d19c7ea52d1032a16fc6a438242babe170b200675674e206ce8d1764bd82d

  • Size

    99KB

  • Sample

    220212-pa2rvscba2

  • MD5

    3a463b6420eb06f1b8d90edf6da7f674

  • SHA1

    3675b77a5a7ce5779da7213d25bc6a5af6a29484

  • SHA256

    026d19c7ea52d1032a16fc6a438242babe170b200675674e206ce8d1764bd82d

  • SHA512

    d2043996c6bd939721618d420a24591fdf808a3a8e51489071ee1fae622c7bf2c1f433eb0ee54ef6d7ffbb1fc2ad1de540dcea0545a0d831dee107dc52ab554d

Malware Config

Targets

    • Target

      026d19c7ea52d1032a16fc6a438242babe170b200675674e206ce8d1764bd82d

    • Size

      99KB

    • MD5

      3a463b6420eb06f1b8d90edf6da7f674

    • SHA1

      3675b77a5a7ce5779da7213d25bc6a5af6a29484

    • SHA256

      026d19c7ea52d1032a16fc6a438242babe170b200675674e206ce8d1764bd82d

    • SHA512

      d2043996c6bd939721618d420a24591fdf808a3a8e51489071ee1fae622c7bf2c1f433eb0ee54ef6d7ffbb1fc2ad1de540dcea0545a0d831dee107dc52ab554d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks