General

  • Target

    0f9b14b73b99ea0ec587efc569eccd79293d48de9ff027d41cc8390928df3b5d

  • Size

    113KB

  • Sample

    220212-hb452shbb2

  • MD5

    eaf182fc6a017496f0f871f363eacf93

  • SHA1

    524f249d7a9921f99b8eea34810dcd458033f0d6

  • SHA256

    0f9b14b73b99ea0ec587efc569eccd79293d48de9ff027d41cc8390928df3b5d

  • SHA512

    7f724058ce5d9362cf104320eff4c0aaf9b9998509b6c37bc51d6edb88e03f711471ab318db2301f17a456c8faa35b713ba0643581436f014868a33e65676687

Malware Config

Targets

    • Target

      0f9b14b73b99ea0ec587efc569eccd79293d48de9ff027d41cc8390928df3b5d

    • Size

      113KB

    • MD5

      eaf182fc6a017496f0f871f363eacf93

    • SHA1

      524f249d7a9921f99b8eea34810dcd458033f0d6

    • SHA256

      0f9b14b73b99ea0ec587efc569eccd79293d48de9ff027d41cc8390928df3b5d

    • SHA512

      7f724058ce5d9362cf104320eff4c0aaf9b9998509b6c37bc51d6edb88e03f711471ab318db2301f17a456c8faa35b713ba0643581436f014868a33e65676687

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks