General

  • Target

    0d8f5313f2acbb6fe71531dd6494c9d27e7993f01857be5b6be2cd8287213295

  • Size

    35KB

  • Sample

    220212-h9xhvsbagn

  • MD5

    d42eaad2ac60a7663e4f8a88c1ddd126

  • SHA1

    62f1d996e90844ae2728657461e8b1e0cb19a399

  • SHA256

    0d8f5313f2acbb6fe71531dd6494c9d27e7993f01857be5b6be2cd8287213295

  • SHA512

    09da38988dd56ba8b889f24976f033f22eaa9355b3342fd9df53c12cb33e09ec889beafb859ff99f31a4d3ab3c94e12e3e93085fff7d3070475ecdce66c0cfab

Malware Config

Targets

    • Target

      0d8f5313f2acbb6fe71531dd6494c9d27e7993f01857be5b6be2cd8287213295

    • Size

      35KB

    • MD5

      d42eaad2ac60a7663e4f8a88c1ddd126

    • SHA1

      62f1d996e90844ae2728657461e8b1e0cb19a399

    • SHA256

      0d8f5313f2acbb6fe71531dd6494c9d27e7993f01857be5b6be2cd8287213295

    • SHA512

      09da38988dd56ba8b889f24976f033f22eaa9355b3342fd9df53c12cb33e09ec889beafb859ff99f31a4d3ab3c94e12e3e93085fff7d3070475ecdce66c0cfab

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks