General

  • Target

    0dcd928b56d54828c43c29f2a85e11e087847faa49f5e26be6970b76d047784a

  • Size

    191KB

  • Sample

    220212-h6zh2shea2

  • MD5

    1ff9e3e8e39dee364ea796b247c3ed1c

  • SHA1

    5f44df2bacdef4a3487809d5ae36b5ea62f2d5d7

  • SHA256

    0dcd928b56d54828c43c29f2a85e11e087847faa49f5e26be6970b76d047784a

  • SHA512

    d9963244318720289b4f24df5f9857ecbc0aa961feb90ef19015aa87b29e58c2484d53618a5cfdb1c566437022b607317aba62e9b13082a659bdf18d2158b48e

Malware Config

Targets

    • Target

      0dcd928b56d54828c43c29f2a85e11e087847faa49f5e26be6970b76d047784a

    • Size

      191KB

    • MD5

      1ff9e3e8e39dee364ea796b247c3ed1c

    • SHA1

      5f44df2bacdef4a3487809d5ae36b5ea62f2d5d7

    • SHA256

      0dcd928b56d54828c43c29f2a85e11e087847faa49f5e26be6970b76d047784a

    • SHA512

      d9963244318720289b4f24df5f9857ecbc0aa961feb90ef19015aa87b29e58c2484d53618a5cfdb1c566437022b607317aba62e9b13082a659bdf18d2158b48e

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks