General

  • Target

    0e39809073f9185f3b5966e6245cc80d286704a271b31612799aa90295825a29

  • Size

    92KB

  • Sample

    220212-h1hckshdb6

  • MD5

    64b4abdea12d6009879d5a878bc3683b

  • SHA1

    fb826219a5a51312ee62f7c69a8988a872716d9f

  • SHA256

    0e39809073f9185f3b5966e6245cc80d286704a271b31612799aa90295825a29

  • SHA512

    55e798e3b7ba2e483842aba3cc21ef8f63a2dff9d9ccb4265940364f189bddf6578186eee1683f2ba84f6d313549badb0045ff73aab60f68dfc945990bff6eb9

Malware Config

Targets

    • Target

      0e39809073f9185f3b5966e6245cc80d286704a271b31612799aa90295825a29

    • Size

      92KB

    • MD5

      64b4abdea12d6009879d5a878bc3683b

    • SHA1

      fb826219a5a51312ee62f7c69a8988a872716d9f

    • SHA256

      0e39809073f9185f3b5966e6245cc80d286704a271b31612799aa90295825a29

    • SHA512

      55e798e3b7ba2e483842aba3cc21ef8f63a2dff9d9ccb4265940364f189bddf6578186eee1683f2ba84f6d313549badb0045ff73aab60f68dfc945990bff6eb9

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks