General

  • Target

    0f8c812032920e493a7bd932c51b12c6b33697b10d139ee0887be89b88af7dfd

  • Size

    191KB

  • Sample

    220212-hct2gahbb8

  • MD5

    73e0d20b758d04e5f53129034600602f

  • SHA1

    4581f5da646b10e847987634f6533cfbd2d356d3

  • SHA256

    0f8c812032920e493a7bd932c51b12c6b33697b10d139ee0887be89b88af7dfd

  • SHA512

    01ccd8451a404a5d5f99825a14508672bd8bf16c5cd20fe04bf19b1a2d3fe00e44d19fc4088ef1d58930c583c8b4bc81f607fe2ae1189a6ecf7239ecec508792

Malware Config

Targets

    • Target

      0f8c812032920e493a7bd932c51b12c6b33697b10d139ee0887be89b88af7dfd

    • Size

      191KB

    • MD5

      73e0d20b758d04e5f53129034600602f

    • SHA1

      4581f5da646b10e847987634f6533cfbd2d356d3

    • SHA256

      0f8c812032920e493a7bd932c51b12c6b33697b10d139ee0887be89b88af7dfd

    • SHA512

      01ccd8451a404a5d5f99825a14508672bd8bf16c5cd20fe04bf19b1a2d3fe00e44d19fc4088ef1d58930c583c8b4bc81f607fe2ae1189a6ecf7239ecec508792

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks