General

  • Target

    0ed6640ae57e9e0457802c9502942517231e32aae4718bbc5ddb1ee8fdbd46ba

  • Size

    150KB

  • Sample

    220212-hs4kvahcd2

  • MD5

    ac229076b9304fc1967dc0d49e09aed3

  • SHA1

    3ebb103c8049d9d27a174161c74633beaccfe3f5

  • SHA256

    0ed6640ae57e9e0457802c9502942517231e32aae4718bbc5ddb1ee8fdbd46ba

  • SHA512

    2986059962da6ceec6eb94e8d8382cd48363fd4a45201896b42ba0c04ad5436fbd32e2a3824eb6123fa23a1ade5bfacbc1f2120f5ff1a46d4dd89b4efcb4003f

Malware Config

Targets

    • Target

      0ed6640ae57e9e0457802c9502942517231e32aae4718bbc5ddb1ee8fdbd46ba

    • Size

      150KB

    • MD5

      ac229076b9304fc1967dc0d49e09aed3

    • SHA1

      3ebb103c8049d9d27a174161c74633beaccfe3f5

    • SHA256

      0ed6640ae57e9e0457802c9502942517231e32aae4718bbc5ddb1ee8fdbd46ba

    • SHA512

      2986059962da6ceec6eb94e8d8382cd48363fd4a45201896b42ba0c04ad5436fbd32e2a3824eb6123fa23a1ade5bfacbc1f2120f5ff1a46d4dd89b4efcb4003f

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks