General

  • Target

    0e1ddc406a723a60928a3cacee301bb654ef19d48423b797208bed8dfcfeaa97

  • Size

    99KB

  • Sample

    220212-h287pahdd5

  • MD5

    2b4b5d610d81ffd74e570840f9c3a480

  • SHA1

    5d1d70274fd90cdab76ac317a71d4d298e92b64e

  • SHA256

    0e1ddc406a723a60928a3cacee301bb654ef19d48423b797208bed8dfcfeaa97

  • SHA512

    2cf8783acb0d1d0987dd5a86cef714971d0d48315394034ce41ce215896562a1159bc2d9b996e6d65c3895d3a5831db184bc3a23dca7795a992245e0f071d628

Malware Config

Targets

    • Target

      0e1ddc406a723a60928a3cacee301bb654ef19d48423b797208bed8dfcfeaa97

    • Size

      99KB

    • MD5

      2b4b5d610d81ffd74e570840f9c3a480

    • SHA1

      5d1d70274fd90cdab76ac317a71d4d298e92b64e

    • SHA256

      0e1ddc406a723a60928a3cacee301bb654ef19d48423b797208bed8dfcfeaa97

    • SHA512

      2cf8783acb0d1d0987dd5a86cef714971d0d48315394034ce41ce215896562a1159bc2d9b996e6d65c3895d3a5831db184bc3a23dca7795a992245e0f071d628

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks