General

  • Target

    0fcefe7344d262f98db58ffcd4d80b55648b4effbe3f5e67f62ca04e1eb12cc2

  • Size

    216KB

  • Sample

    220212-g9m4rahag6

  • MD5

    f22170f2ecb803c4f92b46a7e3014616

  • SHA1

    8c3781d1ae8dd12a76cd04e6f88a410a3823dcc6

  • SHA256

    0fcefe7344d262f98db58ffcd4d80b55648b4effbe3f5e67f62ca04e1eb12cc2

  • SHA512

    122e0576a413fbee7008a2281ec4bfd33f729060157c344d16b845814205050105176c2e286e36e3a5fe3532b763be9948b4da221eb8dd7ea1a3b2795fe8c8ff

Malware Config

Targets

    • Target

      0fcefe7344d262f98db58ffcd4d80b55648b4effbe3f5e67f62ca04e1eb12cc2

    • Size

      216KB

    • MD5

      f22170f2ecb803c4f92b46a7e3014616

    • SHA1

      8c3781d1ae8dd12a76cd04e6f88a410a3823dcc6

    • SHA256

      0fcefe7344d262f98db58ffcd4d80b55648b4effbe3f5e67f62ca04e1eb12cc2

    • SHA512

      122e0576a413fbee7008a2281ec4bfd33f729060157c344d16b845814205050105176c2e286e36e3a5fe3532b763be9948b4da221eb8dd7ea1a3b2795fe8c8ff

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks