General

  • Target

    0f4df7c13737ffcbf9ffda0868a995db9419ee2fa4f249fef5d1525221e2fbde

  • Size

    36KB

  • Sample

    220212-hfmrkahbe8

  • MD5

    be3dab666b42f384fa55ea183a0fbffb

  • SHA1

    00e9e65b526dc1692ef03c44c42ae447bd878125

  • SHA256

    0f4df7c13737ffcbf9ffda0868a995db9419ee2fa4f249fef5d1525221e2fbde

  • SHA512

    66e6e8b1eb5671e80c3888670ea91a2972df5a50ba691d631fa7f48a26e76c0c8dc187f8ae9d0fb6e3cd1960047f855c5eddabea45470a04848e765c4f67c902

Malware Config

Targets

    • Target

      0f4df7c13737ffcbf9ffda0868a995db9419ee2fa4f249fef5d1525221e2fbde

    • Size

      36KB

    • MD5

      be3dab666b42f384fa55ea183a0fbffb

    • SHA1

      00e9e65b526dc1692ef03c44c42ae447bd878125

    • SHA256

      0f4df7c13737ffcbf9ffda0868a995db9419ee2fa4f249fef5d1525221e2fbde

    • SHA512

      66e6e8b1eb5671e80c3888670ea91a2972df5a50ba691d631fa7f48a26e76c0c8dc187f8ae9d0fb6e3cd1960047f855c5eddabea45470a04848e765c4f67c902

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks