General

  • Target

    0fa46e1794fcb3e72f2ade92f72f21448e7aef1fd6061252144cdf8071e4fb3d

  • Size

    200KB

  • Sample

    220212-hbs3sahba6

  • MD5

    bafd4811101071481009786ee537d00d

  • SHA1

    768c1f3779bead2eb451882d2429a86d4c4638f4

  • SHA256

    0fa46e1794fcb3e72f2ade92f72f21448e7aef1fd6061252144cdf8071e4fb3d

  • SHA512

    36ff95c654c5cb3b0f7b8669a9777b64b403554ff37a3ca84e705edf32646894a65b595ed08c82a13e978a3aea9495b103991666051552678dfd39435ba773e8

Malware Config

Targets

    • Target

      0fa46e1794fcb3e72f2ade92f72f21448e7aef1fd6061252144cdf8071e4fb3d

    • Size

      200KB

    • MD5

      bafd4811101071481009786ee537d00d

    • SHA1

      768c1f3779bead2eb451882d2429a86d4c4638f4

    • SHA256

      0fa46e1794fcb3e72f2ade92f72f21448e7aef1fd6061252144cdf8071e4fb3d

    • SHA512

      36ff95c654c5cb3b0f7b8669a9777b64b403554ff37a3ca84e705edf32646894a65b595ed08c82a13e978a3aea9495b103991666051552678dfd39435ba773e8

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks