General

  • Target

    0ff227e05c6a4c76595aedbee57b09a926a38dde73ff79c11b7babd63a91f938

  • Size

    80KB

  • Sample

    220212-g7ysgahaf2

  • MD5

    4efc372bb27e8ab69750a46da05afe0b

  • SHA1

    1103f8f85b0f2eb19f29028a20acfb18f32794a9

  • SHA256

    0ff227e05c6a4c76595aedbee57b09a926a38dde73ff79c11b7babd63a91f938

  • SHA512

    e23b5284d4b84e69f2d8588be8b5f8a25925f0ab25e49de3cea949102618d865cf9015652d6364aba5866be9aa83f13b47d1af85172776136cf0dabcd3d118bb

Malware Config

Targets

    • Target

      0ff227e05c6a4c76595aedbee57b09a926a38dde73ff79c11b7babd63a91f938

    • Size

      80KB

    • MD5

      4efc372bb27e8ab69750a46da05afe0b

    • SHA1

      1103f8f85b0f2eb19f29028a20acfb18f32794a9

    • SHA256

      0ff227e05c6a4c76595aedbee57b09a926a38dde73ff79c11b7babd63a91f938

    • SHA512

      e23b5284d4b84e69f2d8588be8b5f8a25925f0ab25e49de3cea949102618d865cf9015652d6364aba5866be9aa83f13b47d1af85172776136cf0dabcd3d118bb

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks