General

  • Target

    0e1d2d13010af1407216e3a8a710d89e65ce136215c206dfcc2de66448481057

  • Size

    152KB

  • Sample

    220212-h3fa1ahdd7

  • MD5

    fe925d8adc7fa572a553030831983fdf

  • SHA1

    441bb1e70bf849399d7267d47749a063afd4f258

  • SHA256

    0e1d2d13010af1407216e3a8a710d89e65ce136215c206dfcc2de66448481057

  • SHA512

    586804772be980a7ad61d46d31e260ffa698721e409d67313c1e911648e94e3247bbb0cf9f03db841ca85377dabf1a2faa2f83cee8c32655b829e2b7fb63a11f

Malware Config

Targets

    • Target

      0e1d2d13010af1407216e3a8a710d89e65ce136215c206dfcc2de66448481057

    • Size

      152KB

    • MD5

      fe925d8adc7fa572a553030831983fdf

    • SHA1

      441bb1e70bf849399d7267d47749a063afd4f258

    • SHA256

      0e1d2d13010af1407216e3a8a710d89e65ce136215c206dfcc2de66448481057

    • SHA512

      586804772be980a7ad61d46d31e260ffa698721e409d67313c1e911648e94e3247bbb0cf9f03db841ca85377dabf1a2faa2f83cee8c32655b829e2b7fb63a11f

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks