General

  • Target

    0fd9923d1bd34104cc4d1703bb2fa8d471920756217266bb7791b9377f59bdbd

  • Size

    150KB

  • Sample

    220212-g85bmshaf8

  • MD5

    4b25f495491d5a4eeceba0e7d30b3ddb

  • SHA1

    9158fdba204bbd6c121f0168456dd0a0f195b2c5

  • SHA256

    0fd9923d1bd34104cc4d1703bb2fa8d471920756217266bb7791b9377f59bdbd

  • SHA512

    427789251cb787e606c982ee3a76a5b69d4afd491e0bbf7d49c64ce732aeb5dcfdfaa4d2461fd5869e533033a9be4ac05175d572842aa4762d080d38327f6c22

Malware Config

Targets

    • Target

      0fd9923d1bd34104cc4d1703bb2fa8d471920756217266bb7791b9377f59bdbd

    • Size

      150KB

    • MD5

      4b25f495491d5a4eeceba0e7d30b3ddb

    • SHA1

      9158fdba204bbd6c121f0168456dd0a0f195b2c5

    • SHA256

      0fd9923d1bd34104cc4d1703bb2fa8d471920756217266bb7791b9377f59bdbd

    • SHA512

      427789251cb787e606c982ee3a76a5b69d4afd491e0bbf7d49c64ce732aeb5dcfdfaa4d2461fd5869e533033a9be4ac05175d572842aa4762d080d38327f6c22

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks