General

  • Target

    0f12374a44a3f27f5999149c608bf121027d64dcc54fd73552f6888d65304ed9

  • Size

    35KB

  • Sample

    220212-hhpzpsagej

  • MD5

    b15e6b2f0a0108617f4c67d38bb4189c

  • SHA1

    8e1a5e14c0e96d82be1e53b00c8e94bc513e0b65

  • SHA256

    0f12374a44a3f27f5999149c608bf121027d64dcc54fd73552f6888d65304ed9

  • SHA512

    84623967764d10af9319ab1d535d68829230640faf97ad8948edc46a1d1e7b854840ca03326300f99fc437d6862e7322ba60c6f7c6aa868eccc6918a618dbe44

Malware Config

Targets

    • Target

      0f12374a44a3f27f5999149c608bf121027d64dcc54fd73552f6888d65304ed9

    • Size

      35KB

    • MD5

      b15e6b2f0a0108617f4c67d38bb4189c

    • SHA1

      8e1a5e14c0e96d82be1e53b00c8e94bc513e0b65

    • SHA256

      0f12374a44a3f27f5999149c608bf121027d64dcc54fd73552f6888d65304ed9

    • SHA512

      84623967764d10af9319ab1d535d68829230640faf97ad8948edc46a1d1e7b854840ca03326300f99fc437d6862e7322ba60c6f7c6aa868eccc6918a618dbe44

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks