General

  • Target

    0f8e0c0b8c902fd9950ee539ad3da3c2f4d15881dae27e01c3aa979383064a61

  • Size

    144KB

  • Sample

    220212-hcmmdsafgr

  • MD5

    9cfdd52318b4fdc5209eae48c9b2b723

  • SHA1

    fb7cd36e476881bd97774ffc345e5fd517774f7d

  • SHA256

    0f8e0c0b8c902fd9950ee539ad3da3c2f4d15881dae27e01c3aa979383064a61

  • SHA512

    1178183104c009724208cea1231fc8e43692e473d2924253f85969ff0ce80d909130de1bdfdd4b4b7d05879e34100ae9d9a3ba1525d34089fcfeb4e2163ad0bf

Malware Config

Targets

    • Target

      0f8e0c0b8c902fd9950ee539ad3da3c2f4d15881dae27e01c3aa979383064a61

    • Size

      144KB

    • MD5

      9cfdd52318b4fdc5209eae48c9b2b723

    • SHA1

      fb7cd36e476881bd97774ffc345e5fd517774f7d

    • SHA256

      0f8e0c0b8c902fd9950ee539ad3da3c2f4d15881dae27e01c3aa979383064a61

    • SHA512

      1178183104c009724208cea1231fc8e43692e473d2924253f85969ff0ce80d909130de1bdfdd4b4b7d05879e34100ae9d9a3ba1525d34089fcfeb4e2163ad0bf

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks