General

  • Target

    0e1641e0cb465c98387699d9635de009fbdae7372f106ac29ec2332eed1d0ca6

  • Size

    60KB

  • Sample

    220212-h38bsababl

  • MD5

    8632b39c94f22b37ee971ee975a0c591

  • SHA1

    dd9334a24935476341f19b2c32707959d7fb3db1

  • SHA256

    0e1641e0cb465c98387699d9635de009fbdae7372f106ac29ec2332eed1d0ca6

  • SHA512

    40f9c16865a5ff7b4e5de47b2b886def322b9e4905c5a29bf270f533ff797a6cfd77255f5776382b4d8bb56f9dbaf8af781e3989e3ce1877d40934f5c87120e5

Malware Config

Targets

    • Target

      0e1641e0cb465c98387699d9635de009fbdae7372f106ac29ec2332eed1d0ca6

    • Size

      60KB

    • MD5

      8632b39c94f22b37ee971ee975a0c591

    • SHA1

      dd9334a24935476341f19b2c32707959d7fb3db1

    • SHA256

      0e1641e0cb465c98387699d9635de009fbdae7372f106ac29ec2332eed1d0ca6

    • SHA512

      40f9c16865a5ff7b4e5de47b2b886def322b9e4905c5a29bf270f533ff797a6cfd77255f5776382b4d8bb56f9dbaf8af781e3989e3ce1877d40934f5c87120e5

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks