General

  • Target

    0f423def846e99daecaa3401fbc6c5887301a71677dfc30e6f49640ca1cdef0a

  • Size

    216KB

  • Sample

    220212-hf1y7ahbf3

  • MD5

    9f305bc7fd0aa17ecdabce852c514f21

  • SHA1

    65a20ad6ffe8030e9dcbe2b792f9774033e83be4

  • SHA256

    0f423def846e99daecaa3401fbc6c5887301a71677dfc30e6f49640ca1cdef0a

  • SHA512

    d2105a96b9af9aa5adfc5839b51ae030b729a17cd4597cb20c13fcd8986c592c260be4dbe5e31eb16be7cc426062a29091f4b087f94dea1bde304e6277270fd3

Malware Config

Targets

    • Target

      0f423def846e99daecaa3401fbc6c5887301a71677dfc30e6f49640ca1cdef0a

    • Size

      216KB

    • MD5

      9f305bc7fd0aa17ecdabce852c514f21

    • SHA1

      65a20ad6ffe8030e9dcbe2b792f9774033e83be4

    • SHA256

      0f423def846e99daecaa3401fbc6c5887301a71677dfc30e6f49640ca1cdef0a

    • SHA512

      d2105a96b9af9aa5adfc5839b51ae030b729a17cd4597cb20c13fcd8986c592c260be4dbe5e31eb16be7cc426062a29091f4b087f94dea1bde304e6277270fd3

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks