General

  • Target

    0dfd6ad267eeb0bf03101fd436e6c5ed8f79c0bfb0b70920cb35babd2576fe25

  • Size

    89KB

  • Sample

    220212-h4nnrshdf3

  • MD5

    258cadbe277b6f0ddfcf847155f7da02

  • SHA1

    ce47366ee6e75a8fccc384ad932d2e23ded1e672

  • SHA256

    0dfd6ad267eeb0bf03101fd436e6c5ed8f79c0bfb0b70920cb35babd2576fe25

  • SHA512

    267d475c69355b8bc9ff4189a2c68f0d8ae67ab8dbdc785a4f0911bea8c16f861fde66dee3dbed16122f0a085f6b459090017689c5dfd31137a65303e993bb45

Malware Config

Targets

    • Target

      0dfd6ad267eeb0bf03101fd436e6c5ed8f79c0bfb0b70920cb35babd2576fe25

    • Size

      89KB

    • MD5

      258cadbe277b6f0ddfcf847155f7da02

    • SHA1

      ce47366ee6e75a8fccc384ad932d2e23ded1e672

    • SHA256

      0dfd6ad267eeb0bf03101fd436e6c5ed8f79c0bfb0b70920cb35babd2576fe25

    • SHA512

      267d475c69355b8bc9ff4189a2c68f0d8ae67ab8dbdc785a4f0911bea8c16f861fde66dee3dbed16122f0a085f6b459090017689c5dfd31137a65303e993bb45

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks