General

  • Target

    0ed87056f63f42162622d3fbf504a9a404cab9a17345b2c44bb8cfffdb0f6101

  • Size

    80KB

  • Sample

    220212-hs2fgsahaj

  • MD5

    5a87dfdb35a21d3f81e5a7fc4b62907e

  • SHA1

    faabf974fd15aa923d476570c5bc71e4ebea3b48

  • SHA256

    0ed87056f63f42162622d3fbf504a9a404cab9a17345b2c44bb8cfffdb0f6101

  • SHA512

    ca24a3a0b097ee7ca1eb1fac00036e231bf637138c0eb8761eb254a2f94740e71ab9a652a4d31bfd4f6087c5688822f72d074bd48f087048de1db5176ba2698f

Malware Config

Targets

    • Target

      0ed87056f63f42162622d3fbf504a9a404cab9a17345b2c44bb8cfffdb0f6101

    • Size

      80KB

    • MD5

      5a87dfdb35a21d3f81e5a7fc4b62907e

    • SHA1

      faabf974fd15aa923d476570c5bc71e4ebea3b48

    • SHA256

      0ed87056f63f42162622d3fbf504a9a404cab9a17345b2c44bb8cfffdb0f6101

    • SHA512

      ca24a3a0b097ee7ca1eb1fac00036e231bf637138c0eb8761eb254a2f94740e71ab9a652a4d31bfd4f6087c5688822f72d074bd48f087048de1db5176ba2698f

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks