General

  • Target

    0dd157507a115348d707198dd1791e3822d5d7d503138e38ea086d5c518b9679

  • Size

    36KB

  • Sample

    220212-h6xpfsbadr

  • MD5

    fff493a4be8883edc98a3b651127d295

  • SHA1

    619a5a2e1479f46522d00e5fc148655228581811

  • SHA256

    0dd157507a115348d707198dd1791e3822d5d7d503138e38ea086d5c518b9679

  • SHA512

    16d0c00365bc0e696f47ddca6c81bf5189bc1dc1f490ecf2746aea904625e6df00bdd123bc2899612d34958c6f5b537b9e95c54cb05c3b2169b5ca83e2b6e1f3

Malware Config

Targets

    • Target

      0dd157507a115348d707198dd1791e3822d5d7d503138e38ea086d5c518b9679

    • Size

      36KB

    • MD5

      fff493a4be8883edc98a3b651127d295

    • SHA1

      619a5a2e1479f46522d00e5fc148655228581811

    • SHA256

      0dd157507a115348d707198dd1791e3822d5d7d503138e38ea086d5c518b9679

    • SHA512

      16d0c00365bc0e696f47ddca6c81bf5189bc1dc1f490ecf2746aea904625e6df00bdd123bc2899612d34958c6f5b537b9e95c54cb05c3b2169b5ca83e2b6e1f3

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks