General

  • Target

    0f368def5de5e7865ccad242901c91577f5ddf4881dad5a4cf2f47b8ed1b1979

  • Size

    191KB

  • Sample

    220212-hgcb8ahbf5

  • MD5

    448c34ba85bbed7f3ad823121f649fc2

  • SHA1

    823339671cc688f503da54d5ba9c9075f0aa0a56

  • SHA256

    0f368def5de5e7865ccad242901c91577f5ddf4881dad5a4cf2f47b8ed1b1979

  • SHA512

    748ead3242dbab59099b9e7ed4cd94207a0e06675a5fdb2f822e071ebfbfbfc0b94a2589f548a91fadb880a978dcb596cbe3a6796689df934dc9d9b1604ece68

Malware Config

Targets

    • Target

      0f368def5de5e7865ccad242901c91577f5ddf4881dad5a4cf2f47b8ed1b1979

    • Size

      191KB

    • MD5

      448c34ba85bbed7f3ad823121f649fc2

    • SHA1

      823339671cc688f503da54d5ba9c9075f0aa0a56

    • SHA256

      0f368def5de5e7865ccad242901c91577f5ddf4881dad5a4cf2f47b8ed1b1979

    • SHA512

      748ead3242dbab59099b9e7ed4cd94207a0e06675a5fdb2f822e071ebfbfbfc0b94a2589f548a91fadb880a978dcb596cbe3a6796689df934dc9d9b1604ece68

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks