General

  • Target

    0f5b8d4712b6b0b99ce0b007b0f6dc28af237e53985cf313b63657cf3842dd1f

  • Size

    170KB

  • Sample

    220212-henbpshbd5

  • MD5

    bfef77600166f1ce95448e8f1fd4017a

  • SHA1

    af452885b4d7b37b7c721df4a40bc775e4493b91

  • SHA256

    0f5b8d4712b6b0b99ce0b007b0f6dc28af237e53985cf313b63657cf3842dd1f

  • SHA512

    4418ca4fe88165a20b8435a6bbb3cbd6668b510ab663e9a3f135f617271d1bf3c0714ce919f82db4804a54a444820e817bf70c5a2cf840aa6aaa99cd9eb48839

Malware Config

Targets

    • Target

      0f5b8d4712b6b0b99ce0b007b0f6dc28af237e53985cf313b63657cf3842dd1f

    • Size

      170KB

    • MD5

      bfef77600166f1ce95448e8f1fd4017a

    • SHA1

      af452885b4d7b37b7c721df4a40bc775e4493b91

    • SHA256

      0f5b8d4712b6b0b99ce0b007b0f6dc28af237e53985cf313b63657cf3842dd1f

    • SHA512

      4418ca4fe88165a20b8435a6bbb3cbd6668b510ab663e9a3f135f617271d1bf3c0714ce919f82db4804a54a444820e817bf70c5a2cf840aa6aaa99cd9eb48839

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks