General

  • Target

    0f67b84d59836af15a1a17580993e904acd0e6327dac102ca9b03e3dea58a746

  • Size

    80KB

  • Sample

    220212-hedghaagaq

  • MD5

    7a8a2755f9771d25c4f8e83b64b17a5b

  • SHA1

    5f08c357367c597ce50227de03d8249722b3482f

  • SHA256

    0f67b84d59836af15a1a17580993e904acd0e6327dac102ca9b03e3dea58a746

  • SHA512

    658fc9fff1af1baeb1e2c29aac6413e55be8d33072e19ef5b3b3b069c1f37375c2974a825d16dd6818d534a4f04d098a19b67214a6e8f0c259c1397f853a9eb2

Malware Config

Targets

    • Target

      0f67b84d59836af15a1a17580993e904acd0e6327dac102ca9b03e3dea58a746

    • Size

      80KB

    • MD5

      7a8a2755f9771d25c4f8e83b64b17a5b

    • SHA1

      5f08c357367c597ce50227de03d8249722b3482f

    • SHA256

      0f67b84d59836af15a1a17580993e904acd0e6327dac102ca9b03e3dea58a746

    • SHA512

      658fc9fff1af1baeb1e2c29aac6413e55be8d33072e19ef5b3b3b069c1f37375c2974a825d16dd6818d534a4f04d098a19b67214a6e8f0c259c1397f853a9eb2

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks