General

  • Target

    0fc2a093e96c6cd549bc6632415a2a3fcebda8c68ed92802569d74394d2ef3d3

  • Size

    36KB

  • Sample

    220212-hagy5ahah4

  • MD5

    ee8759ca755faab6b51012963215e80e

  • SHA1

    a9e25a7a39be89bfa991c4f509b6e1886c01a591

  • SHA256

    0fc2a093e96c6cd549bc6632415a2a3fcebda8c68ed92802569d74394d2ef3d3

  • SHA512

    81beb479c20ca559e4596a5afac0ab06899e0ad3cddf7e5164c183676762dc2ca5a40334fb6710a96f07561b8afd48422e1b35983cf90244499783fb5c4815d1

Malware Config

Targets

    • Target

      0fc2a093e96c6cd549bc6632415a2a3fcebda8c68ed92802569d74394d2ef3d3

    • Size

      36KB

    • MD5

      ee8759ca755faab6b51012963215e80e

    • SHA1

      a9e25a7a39be89bfa991c4f509b6e1886c01a591

    • SHA256

      0fc2a093e96c6cd549bc6632415a2a3fcebda8c68ed92802569d74394d2ef3d3

    • SHA512

      81beb479c20ca559e4596a5afac0ab06899e0ad3cddf7e5164c183676762dc2ca5a40334fb6710a96f07561b8afd48422e1b35983cf90244499783fb5c4815d1

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks