General

  • Target

    0e021cae6d9ed016c897b100badf70a6c327fd25d6be25ac2449e05bfb656745

  • Size

    216KB

  • Sample

    220212-h4jptahdf2

  • MD5

    e7b0ca14caf8ab85e8ab124be76e59c2

  • SHA1

    87aa844541260d76b8745304a798a420a89299e8

  • SHA256

    0e021cae6d9ed016c897b100badf70a6c327fd25d6be25ac2449e05bfb656745

  • SHA512

    af736803f50fef7f24d530a311a8dfb247f2c2d3c7c92678449389943a2c0180fe9c805f3440e77cc33111af776abce16efec4007b35c5104d692c2cbe1cfcf3

Malware Config

Targets

    • Target

      0e021cae6d9ed016c897b100badf70a6c327fd25d6be25ac2449e05bfb656745

    • Size

      216KB

    • MD5

      e7b0ca14caf8ab85e8ab124be76e59c2

    • SHA1

      87aa844541260d76b8745304a798a420a89299e8

    • SHA256

      0e021cae6d9ed016c897b100badf70a6c327fd25d6be25ac2449e05bfb656745

    • SHA512

      af736803f50fef7f24d530a311a8dfb247f2c2d3c7c92678449389943a2c0180fe9c805f3440e77cc33111af776abce16efec4007b35c5104d692c2cbe1cfcf3

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks