General

  • Target

    0e3c8b8ba79bb0707ffe3e29ba1fc4a344f1e01eea157aee3d00daecf4fbd610

  • Size

    99KB

  • Sample

    220212-h1fhzsahgq

  • MD5

    701ba055cb09d5117dc0ecb310f0f393

  • SHA1

    b761cb4fadb470115391aa629e623700c5f7d247

  • SHA256

    0e3c8b8ba79bb0707ffe3e29ba1fc4a344f1e01eea157aee3d00daecf4fbd610

  • SHA512

    8d2ad3a02faabd996e5770132c41dc1da8fe66581a8451112da41fe64287bbf5a8b7aae882f2c22e1fc75f6c77c93723d5f984f2176959981806cfa1ebff8a33

Malware Config

Targets

    • Target

      0e3c8b8ba79bb0707ffe3e29ba1fc4a344f1e01eea157aee3d00daecf4fbd610

    • Size

      99KB

    • MD5

      701ba055cb09d5117dc0ecb310f0f393

    • SHA1

      b761cb4fadb470115391aa629e623700c5f7d247

    • SHA256

      0e3c8b8ba79bb0707ffe3e29ba1fc4a344f1e01eea157aee3d00daecf4fbd610

    • SHA512

      8d2ad3a02faabd996e5770132c41dc1da8fe66581a8451112da41fe64287bbf5a8b7aae882f2c22e1fc75f6c77c93723d5f984f2176959981806cfa1ebff8a33

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks