General

  • Target

    0f080000eaa8b1a941a1789433be97739ee1a13966627cbddac53f651649ee38

  • Size

    101KB

  • Sample

    220212-hjlnnshbh8

  • MD5

    28b122a373ba533fb0141b9f51f1463a

  • SHA1

    88070fb9a1a9c3e6e6f72de6a4267c7b4c6912f4

  • SHA256

    0f080000eaa8b1a941a1789433be97739ee1a13966627cbddac53f651649ee38

  • SHA512

    ff8dfbc404ccbfbebb94da40cfc4b8e40b1d01620478b80a09838a73e0beaca85cdafcca699203a240e3bca79ef311a7517fbeefe618c847a5635b3efd8ad584

Malware Config

Targets

    • Target

      0f080000eaa8b1a941a1789433be97739ee1a13966627cbddac53f651649ee38

    • Size

      101KB

    • MD5

      28b122a373ba533fb0141b9f51f1463a

    • SHA1

      88070fb9a1a9c3e6e6f72de6a4267c7b4c6912f4

    • SHA256

      0f080000eaa8b1a941a1789433be97739ee1a13966627cbddac53f651649ee38

    • SHA512

      ff8dfbc404ccbfbebb94da40cfc4b8e40b1d01620478b80a09838a73e0beaca85cdafcca699203a240e3bca79ef311a7517fbeefe618c847a5635b3efd8ad584

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks