General

  • Target

    0facb4056bf97b999e0698f3690a3348e54897d49a98d949c74993903b33e35d

  • Size

    80KB

  • Sample

    220212-hbb49saffp

  • MD5

    ae41a035c0b5959f7e11060a772fcba3

  • SHA1

    319469f74dec1d86f3d4cf9a4cb11aa0e1b7a4c1

  • SHA256

    0facb4056bf97b999e0698f3690a3348e54897d49a98d949c74993903b33e35d

  • SHA512

    a3c46ac0e8b74a426fbc3bcfbaa179bb4adb7aec44530ff1b209bee5dc4179003b7b1909197995e3a7984df78bcb8cc7de8d97c69db9241959ff729f6511e660

Malware Config

Targets

    • Target

      0facb4056bf97b999e0698f3690a3348e54897d49a98d949c74993903b33e35d

    • Size

      80KB

    • MD5

      ae41a035c0b5959f7e11060a772fcba3

    • SHA1

      319469f74dec1d86f3d4cf9a4cb11aa0e1b7a4c1

    • SHA256

      0facb4056bf97b999e0698f3690a3348e54897d49a98d949c74993903b33e35d

    • SHA512

      a3c46ac0e8b74a426fbc3bcfbaa179bb4adb7aec44530ff1b209bee5dc4179003b7b1909197995e3a7984df78bcb8cc7de8d97c69db9241959ff729f6511e660

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks