General

  • Target

    0ee76e6838c4f43c8c2afa97293c00b1f64a751576972a4ce89e8dd01685ff77

  • Size

    150KB

  • Sample

    220212-hr1gsshcc3

  • MD5

    b8e43a0bc6423187e2c6134ee7cd26f9

  • SHA1

    e7f2edf9497d2d1840feaf72cc7fa7001b323c71

  • SHA256

    0ee76e6838c4f43c8c2afa97293c00b1f64a751576972a4ce89e8dd01685ff77

  • SHA512

    3be0d1dbc674378cbdefa26d360a2f5d621d630c3ea79c774992364c0bc55da3c316b1ca7a5cdfd8c8dd0b0211f32885ae2cad596049216f9361d750a230889d

Malware Config

Targets

    • Target

      0ee76e6838c4f43c8c2afa97293c00b1f64a751576972a4ce89e8dd01685ff77

    • Size

      150KB

    • MD5

      b8e43a0bc6423187e2c6134ee7cd26f9

    • SHA1

      e7f2edf9497d2d1840feaf72cc7fa7001b323c71

    • SHA256

      0ee76e6838c4f43c8c2afa97293c00b1f64a751576972a4ce89e8dd01685ff77

    • SHA512

      3be0d1dbc674378cbdefa26d360a2f5d621d630c3ea79c774992364c0bc55da3c316b1ca7a5cdfd8c8dd0b0211f32885ae2cad596049216f9361d750a230889d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks