General

  • Target

    0f0735dc340c4c0b40b919668ea1ff114ae561a6214805ffbcdc56f7e2073208

  • Size

    176KB

  • Sample

    220212-hjtdhshca2

  • MD5

    a3cff4add41773834124efa4f989a87f

  • SHA1

    d8661cb0612419c4245305e88094dd38bcecf670

  • SHA256

    0f0735dc340c4c0b40b919668ea1ff114ae561a6214805ffbcdc56f7e2073208

  • SHA512

    d1d87419e4c65ae306a1df67ae9bf618c309015773f46f33a9763a14999bfb3f1b4aec0434fd086d9550cb624a8c91cdbe5709158b2586b568f5f3a185483494

Malware Config

Targets

    • Target

      0f0735dc340c4c0b40b919668ea1ff114ae561a6214805ffbcdc56f7e2073208

    • Size

      176KB

    • MD5

      a3cff4add41773834124efa4f989a87f

    • SHA1

      d8661cb0612419c4245305e88094dd38bcecf670

    • SHA256

      0f0735dc340c4c0b40b919668ea1ff114ae561a6214805ffbcdc56f7e2073208

    • SHA512

      d1d87419e4c65ae306a1df67ae9bf618c309015773f46f33a9763a14999bfb3f1b4aec0434fd086d9550cb624a8c91cdbe5709158b2586b568f5f3a185483494

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks