General

  • Target

    0faafe7232ce86837fb035aee744b41f6d0c7476df08fb8c60fc9b73bf78f978

  • Size

    80KB

  • Sample

    220212-hbgpraaffr

  • MD5

    1adab8a01e31897bf46a30db559f02f9

  • SHA1

    5f0c7303a0ed92d8eb00b5f293fe6b02fea4c98b

  • SHA256

    0faafe7232ce86837fb035aee744b41f6d0c7476df08fb8c60fc9b73bf78f978

  • SHA512

    aba22985ca492bc0d30adf0365d20aca6b5bba73e5a420be7283cc2b0e1f295f140fe2dbf0cfa5901356cd667f104e13711ceacd44755c1cf22425497af88473

Malware Config

Targets

    • Target

      0faafe7232ce86837fb035aee744b41f6d0c7476df08fb8c60fc9b73bf78f978

    • Size

      80KB

    • MD5

      1adab8a01e31897bf46a30db559f02f9

    • SHA1

      5f0c7303a0ed92d8eb00b5f293fe6b02fea4c98b

    • SHA256

      0faafe7232ce86837fb035aee744b41f6d0c7476df08fb8c60fc9b73bf78f978

    • SHA512

      aba22985ca492bc0d30adf0365d20aca6b5bba73e5a420be7283cc2b0e1f295f140fe2dbf0cfa5901356cd667f104e13711ceacd44755c1cf22425497af88473

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks