General

  • Target

    0f4c9d536f04fcfdd4b52efec58ab507112793b13774403857aa6d099fc44d33

  • Size

    36KB

  • Sample

    220212-hfr2aahbf2

  • MD5

    8b9b41cd2c6a91497993088f4236fed1

  • SHA1

    87ca80e5c21c9de5edde73c535b5e4a8e13c2ee3

  • SHA256

    0f4c9d536f04fcfdd4b52efec58ab507112793b13774403857aa6d099fc44d33

  • SHA512

    3722e4b5549528882f11b2a5397c27c094b4ab400bc0d2c3b7c1b5ce8c987e48d958dc65f6b4727f3993a1a79630bbad77b6e7b7d3651a88c64a03028d374eea

Malware Config

Targets

    • Target

      0f4c9d536f04fcfdd4b52efec58ab507112793b13774403857aa6d099fc44d33

    • Size

      36KB

    • MD5

      8b9b41cd2c6a91497993088f4236fed1

    • SHA1

      87ca80e5c21c9de5edde73c535b5e4a8e13c2ee3

    • SHA256

      0f4c9d536f04fcfdd4b52efec58ab507112793b13774403857aa6d099fc44d33

    • SHA512

      3722e4b5549528882f11b2a5397c27c094b4ab400bc0d2c3b7c1b5ce8c987e48d958dc65f6b4727f3993a1a79630bbad77b6e7b7d3651a88c64a03028d374eea

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks