General

  • Target

    0d9ba3dfbff43dcbd41f599ee07d32e8187aee8a30a39afaeb05569ee8524a95

  • Size

    216KB

  • Sample

    220212-h9gseahec7

  • MD5

    c5b3bacada50b868df88d0fcc7db8ca9

  • SHA1

    d1a64536ed4a66e61bf9c42c0d664ad23b668590

  • SHA256

    0d9ba3dfbff43dcbd41f599ee07d32e8187aee8a30a39afaeb05569ee8524a95

  • SHA512

    c05f5f0b10c512ba8bcee7b2438d0f9267e5183be20c564b3d140ff6b0837767bc6eda0e6abd2dfedd78d2f8add2ffc2effbbfe24e5ffe32d20dda105bce45d7

Malware Config

Targets

    • Target

      0d9ba3dfbff43dcbd41f599ee07d32e8187aee8a30a39afaeb05569ee8524a95

    • Size

      216KB

    • MD5

      c5b3bacada50b868df88d0fcc7db8ca9

    • SHA1

      d1a64536ed4a66e61bf9c42c0d664ad23b668590

    • SHA256

      0d9ba3dfbff43dcbd41f599ee07d32e8187aee8a30a39afaeb05569ee8524a95

    • SHA512

      c05f5f0b10c512ba8bcee7b2438d0f9267e5183be20c564b3d140ff6b0837767bc6eda0e6abd2dfedd78d2f8add2ffc2effbbfe24e5ffe32d20dda105bce45d7

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks