General

  • Target

    0f3af70c83ccb285eb5c4bae2203d14ed0de0128b189ac0c36405699bc69c866

  • Size

    191KB

  • Sample

    220212-hgahmaagcn

  • MD5

    f55b2262310ec8cee3c32b3fc355b99c

  • SHA1

    dc64aa26f8b9af07ab3fbf7e3fdcc27df57c88a5

  • SHA256

    0f3af70c83ccb285eb5c4bae2203d14ed0de0128b189ac0c36405699bc69c866

  • SHA512

    b84a09b4d556944eb291145bf36bf0adf080da222ea75f571dbec5a1cc26e3af0b8c1be589ceed9159793b5602e78c8ac5372d3d509df67c70c56c62545acf99

Malware Config

Targets

    • Target

      0f3af70c83ccb285eb5c4bae2203d14ed0de0128b189ac0c36405699bc69c866

    • Size

      191KB

    • MD5

      f55b2262310ec8cee3c32b3fc355b99c

    • SHA1

      dc64aa26f8b9af07ab3fbf7e3fdcc27df57c88a5

    • SHA256

      0f3af70c83ccb285eb5c4bae2203d14ed0de0128b189ac0c36405699bc69c866

    • SHA512

      b84a09b4d556944eb291145bf36bf0adf080da222ea75f571dbec5a1cc26e3af0b8c1be589ceed9159793b5602e78c8ac5372d3d509df67c70c56c62545acf99

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks