General

  • Target

    0ef2a13e7225cc4cc4be2aed9fa6ca79b93096c977de2134c9fe0500d339a43c

  • Size

    101KB

  • Sample

    220212-hqwr8ahca9

  • MD5

    264a9b7a3614f9955443bf1e201bdf32

  • SHA1

    fbc35d22731006b2c390a1aa142b3099d28f6559

  • SHA256

    0ef2a13e7225cc4cc4be2aed9fa6ca79b93096c977de2134c9fe0500d339a43c

  • SHA512

    235a6a3e63e88c5a98b6dacfdbcd7852190ae2112e6f64dd6b8e8318727dd0781492d2d5ed33793fdf5b9b7f9cd6dfad6efd597f59720dd955dcb31a9419bec9

Malware Config

Targets

    • Target

      0ef2a13e7225cc4cc4be2aed9fa6ca79b93096c977de2134c9fe0500d339a43c

    • Size

      101KB

    • MD5

      264a9b7a3614f9955443bf1e201bdf32

    • SHA1

      fbc35d22731006b2c390a1aa142b3099d28f6559

    • SHA256

      0ef2a13e7225cc4cc4be2aed9fa6ca79b93096c977de2134c9fe0500d339a43c

    • SHA512

      235a6a3e63e88c5a98b6dacfdbcd7852190ae2112e6f64dd6b8e8318727dd0781492d2d5ed33793fdf5b9b7f9cd6dfad6efd597f59720dd955dcb31a9419bec9

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks