General

  • Target

    0f806ffd94c274e3604e64f35fddd7710cf8c7d6c674276d6dcfc38ce50f615c

  • Size

    80KB

  • Sample

    220212-hdf61aafhr

  • MD5

    33574dfc4811cda63c21cf7f32bbce5e

  • SHA1

    a815af1246167842e568dae31ed819ecb2e391d8

  • SHA256

    0f806ffd94c274e3604e64f35fddd7710cf8c7d6c674276d6dcfc38ce50f615c

  • SHA512

    aaaa6493a0fe760bda0d4f389b367c012c1418236b2dd3f517b1dcf86fb713835af3c35b10475785419771e13cda216f70697a8129ee2408361a460be8e8749e

Malware Config

Targets

    • Target

      0f806ffd94c274e3604e64f35fddd7710cf8c7d6c674276d6dcfc38ce50f615c

    • Size

      80KB

    • MD5

      33574dfc4811cda63c21cf7f32bbce5e

    • SHA1

      a815af1246167842e568dae31ed819ecb2e391d8

    • SHA256

      0f806ffd94c274e3604e64f35fddd7710cf8c7d6c674276d6dcfc38ce50f615c

    • SHA512

      aaaa6493a0fe760bda0d4f389b367c012c1418236b2dd3f517b1dcf86fb713835af3c35b10475785419771e13cda216f70697a8129ee2408361a460be8e8749e

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks