General

  • Target

    0ee3a70eee79d621bcf4ed84d75ef52ab772335ecdcaf5c616ac782a5c52786b

  • Size

    99KB

  • Sample

    220212-hselqaaghl

  • MD5

    ebbac991db86c808f50834b983686ab4

  • SHA1

    b87eb0049b0b1a89dcb29195ab59c5c4961d89b2

  • SHA256

    0ee3a70eee79d621bcf4ed84d75ef52ab772335ecdcaf5c616ac782a5c52786b

  • SHA512

    a8b1fbc3a86d6a4c1928c5e686050389bc6fd1c36aa1f956874e55fe09491057f78536636576f50218dca208743f48b23d82e1f11f9695e282884f31542a1e6c

Malware Config

Targets

    • Target

      0ee3a70eee79d621bcf4ed84d75ef52ab772335ecdcaf5c616ac782a5c52786b

    • Size

      99KB

    • MD5

      ebbac991db86c808f50834b983686ab4

    • SHA1

      b87eb0049b0b1a89dcb29195ab59c5c4961d89b2

    • SHA256

      0ee3a70eee79d621bcf4ed84d75ef52ab772335ecdcaf5c616ac782a5c52786b

    • SHA512

      a8b1fbc3a86d6a4c1928c5e686050389bc6fd1c36aa1f956874e55fe09491057f78536636576f50218dca208743f48b23d82e1f11f9695e282884f31542a1e6c

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks