General

  • Target

    0dead0ff291b882e7d16c5ed8f2ec148e173eeb2a3fabe22093dc4c534fa6245

  • Size

    36KB

  • Sample

    220212-h49agabacj

  • MD5

    b0588c204337482f7d96d559d99bd0ea

  • SHA1

    0e69b5404de583fc2009bb0a9b6ac284f1560275

  • SHA256

    0dead0ff291b882e7d16c5ed8f2ec148e173eeb2a3fabe22093dc4c534fa6245

  • SHA512

    dbc6e089fcfe300a21c996082b905118fbb0201f4da92c4f8901f224164e08ab784fbadbd9c8a9aabae86e91a6d738f7159d65e0933ee491cb861ad579df7470

Malware Config

Targets

    • Target

      0dead0ff291b882e7d16c5ed8f2ec148e173eeb2a3fabe22093dc4c534fa6245

    • Size

      36KB

    • MD5

      b0588c204337482f7d96d559d99bd0ea

    • SHA1

      0e69b5404de583fc2009bb0a9b6ac284f1560275

    • SHA256

      0dead0ff291b882e7d16c5ed8f2ec148e173eeb2a3fabe22093dc4c534fa6245

    • SHA512

      dbc6e089fcfe300a21c996082b905118fbb0201f4da92c4f8901f224164e08ab784fbadbd9c8a9aabae86e91a6d738f7159d65e0933ee491cb861ad579df7470

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks