General

  • Target

    0f939642a06e131e164cebba78dfbccf3ee91efc4fc1609add52696795f899ae

  • Size

    99KB

  • Sample

    220212-hcddqahbb4

  • MD5

    8e7cdfbdafaa90688032f6de9e2f1359

  • SHA1

    4f04c1130ad2af7b367379eced22c36a4b0a522f

  • SHA256

    0f939642a06e131e164cebba78dfbccf3ee91efc4fc1609add52696795f899ae

  • SHA512

    780e7b244f1f6c34160d71ff2832a1d977c9a0f7b3543c7b0566be387b7763228ac74d88ff5db0bb6640d707e3a437926ed562dee4ac1c617bcd04ccd2f083ef

Malware Config

Targets

    • Target

      0f939642a06e131e164cebba78dfbccf3ee91efc4fc1609add52696795f899ae

    • Size

      99KB

    • MD5

      8e7cdfbdafaa90688032f6de9e2f1359

    • SHA1

      4f04c1130ad2af7b367379eced22c36a4b0a522f

    • SHA256

      0f939642a06e131e164cebba78dfbccf3ee91efc4fc1609add52696795f899ae

    • SHA512

      780e7b244f1f6c34160d71ff2832a1d977c9a0f7b3543c7b0566be387b7763228ac74d88ff5db0bb6640d707e3a437926ed562dee4ac1c617bcd04ccd2f083ef

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks