General

  • Target

    0e14108b2795dd66ce74234ff3317b36d05d18b485d4ec20eef0176ca1e5508f

  • Size

    216KB

  • Sample

    220212-h4af5shde8

  • MD5

    1ba54b70b6e2c8edfb5e28c1db816735

  • SHA1

    1ce656a3e49e295e255bc3d539b0caf31d0a3770

  • SHA256

    0e14108b2795dd66ce74234ff3317b36d05d18b485d4ec20eef0176ca1e5508f

  • SHA512

    796d6b2f863d029db6e1e9f3d48bbd882f941ea68045015af980fce14ad145e6242d63a70f7470c4ccb8088e9f9614050f0e9b3647411fcf4390c6c3f5244414

Malware Config

Targets

    • Target

      0e14108b2795dd66ce74234ff3317b36d05d18b485d4ec20eef0176ca1e5508f

    • Size

      216KB

    • MD5

      1ba54b70b6e2c8edfb5e28c1db816735

    • SHA1

      1ce656a3e49e295e255bc3d539b0caf31d0a3770

    • SHA256

      0e14108b2795dd66ce74234ff3317b36d05d18b485d4ec20eef0176ca1e5508f

    • SHA512

      796d6b2f863d029db6e1e9f3d48bbd882f941ea68045015af980fce14ad145e6242d63a70f7470c4ccb8088e9f9614050f0e9b3647411fcf4390c6c3f5244414

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks