General

  • Target

    0ffad3e898a7ccf294a879b6a6436984a7a53f125cb5916f0c0936fe55d4b215

  • Size

    60KB

  • Sample

    220212-g7pjssafbj

  • MD5

    8fdfdfb77d5f5c30aefbacc62c921d30

  • SHA1

    80e72ba96a8a51ce827b2a202a99d08abb382377

  • SHA256

    0ffad3e898a7ccf294a879b6a6436984a7a53f125cb5916f0c0936fe55d4b215

  • SHA512

    0a9ec4105665125e8acd437a42c5ab6dfc72370c72af07a10b22cb4ca0e905884fed50ca32eb8f0764af550c5fad85dbf45ea0102fc14accbd5858a1f404f548

Malware Config

Targets

    • Target

      0ffad3e898a7ccf294a879b6a6436984a7a53f125cb5916f0c0936fe55d4b215

    • Size

      60KB

    • MD5

      8fdfdfb77d5f5c30aefbacc62c921d30

    • SHA1

      80e72ba96a8a51ce827b2a202a99d08abb382377

    • SHA256

      0ffad3e898a7ccf294a879b6a6436984a7a53f125cb5916f0c0936fe55d4b215

    • SHA512

      0a9ec4105665125e8acd437a42c5ab6dfc72370c72af07a10b22cb4ca0e905884fed50ca32eb8f0764af550c5fad85dbf45ea0102fc14accbd5858a1f404f548

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks