General

  • Target

    0e261ea9135232c1e44b01e117e1eaf3133b999787533f9e4ca5c8b4267ceb9a

  • Size

    60KB

  • Sample

    220212-h2z9sahdd4

  • MD5

    44c4ffee7df85e235384277fa0d85bb3

  • SHA1

    81faacb91044693c1ad33e0966890696156eee32

  • SHA256

    0e261ea9135232c1e44b01e117e1eaf3133b999787533f9e4ca5c8b4267ceb9a

  • SHA512

    a179486f476acab50fb22ae575486a7ad51f3fe32a688c9cf8729d55ce20a7a3ea9840aac05cc98c0cb13c89bff5e803a10bf5f4275a702f99845c217cba70ce

Malware Config

Targets

    • Target

      0e261ea9135232c1e44b01e117e1eaf3133b999787533f9e4ca5c8b4267ceb9a

    • Size

      60KB

    • MD5

      44c4ffee7df85e235384277fa0d85bb3

    • SHA1

      81faacb91044693c1ad33e0966890696156eee32

    • SHA256

      0e261ea9135232c1e44b01e117e1eaf3133b999787533f9e4ca5c8b4267ceb9a

    • SHA512

      a179486f476acab50fb22ae575486a7ad51f3fe32a688c9cf8729d55ce20a7a3ea9840aac05cc98c0cb13c89bff5e803a10bf5f4275a702f99845c217cba70ce

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks