General

  • Target

    0d9ba37571db8035e4e5f6b5dea8bdc60b10ebc7f254db4c214af458001510db

  • Size

    58KB

  • Sample

    220212-h9jl1abagm

  • MD5

    0c4b059fb6ad821f1280efa961ae41d6

  • SHA1

    75e983285219ad60ff51db654635607aac694e2b

  • SHA256

    0d9ba37571db8035e4e5f6b5dea8bdc60b10ebc7f254db4c214af458001510db

  • SHA512

    f9095e7fed437ddb080c2fe5fcc68a76c79fbbddbae4ec617d0fdd4645656100cbd6a9420f8961956a14d50608bfae4a98e66cf7796f2c79f714bba355c3ae16

Malware Config

Targets

    • Target

      0d9ba37571db8035e4e5f6b5dea8bdc60b10ebc7f254db4c214af458001510db

    • Size

      58KB

    • MD5

      0c4b059fb6ad821f1280efa961ae41d6

    • SHA1

      75e983285219ad60ff51db654635607aac694e2b

    • SHA256

      0d9ba37571db8035e4e5f6b5dea8bdc60b10ebc7f254db4c214af458001510db

    • SHA512

      f9095e7fed437ddb080c2fe5fcc68a76c79fbbddbae4ec617d0fdd4645656100cbd6a9420f8961956a14d50608bfae4a98e66cf7796f2c79f714bba355c3ae16

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks