General

  • Target

    0ff17c762b832c6f3a9c83b3246f84741536be95cf652336a4622798c2187968

  • Size

    80KB

  • Sample

    220212-g73reshaf3

  • MD5

    88469fbc6a3854f7b21b7bbcca6a6c53

  • SHA1

    ab44262e8b04bfaa483b2296cdc74590f128fc9e

  • SHA256

    0ff17c762b832c6f3a9c83b3246f84741536be95cf652336a4622798c2187968

  • SHA512

    46654d49b922a9fe2e1ae69ecc50390edc1a7defe74fba4a0ec0fc85ed396e31df28d4def580501652ba5599c2c57ca21d73e434978a65fca7c65ed98233b280

Malware Config

Targets

    • Target

      0ff17c762b832c6f3a9c83b3246f84741536be95cf652336a4622798c2187968

    • Size

      80KB

    • MD5

      88469fbc6a3854f7b21b7bbcca6a6c53

    • SHA1

      ab44262e8b04bfaa483b2296cdc74590f128fc9e

    • SHA256

      0ff17c762b832c6f3a9c83b3246f84741536be95cf652336a4622798c2187968

    • SHA512

      46654d49b922a9fe2e1ae69ecc50390edc1a7defe74fba4a0ec0fc85ed396e31df28d4def580501652ba5599c2c57ca21d73e434978a65fca7c65ed98233b280

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks