General

  • Target

    0ebdd3b3b30fef808b1caa408fc903d14a7feb7dcd9980a87fe7361a77d2ea39

  • Size

    216KB

  • Sample

    220212-ht3d6shce5

  • MD5

    21285dcba74114f63509e0e2ab6c58e3

  • SHA1

    386b61db742e37034443b942b6779393285fd123

  • SHA256

    0ebdd3b3b30fef808b1caa408fc903d14a7feb7dcd9980a87fe7361a77d2ea39

  • SHA512

    9445c9cc6b074896546c60dfff4deefd22445b80d9fabad7f45aab6f1c3e9d2fca38dcbb565563f61603d1dc7aaa188d961e8315bcf3145c446f80360e7879f3

Malware Config

Targets

    • Target

      0ebdd3b3b30fef808b1caa408fc903d14a7feb7dcd9980a87fe7361a77d2ea39

    • Size

      216KB

    • MD5

      21285dcba74114f63509e0e2ab6c58e3

    • SHA1

      386b61db742e37034443b942b6779393285fd123

    • SHA256

      0ebdd3b3b30fef808b1caa408fc903d14a7feb7dcd9980a87fe7361a77d2ea39

    • SHA512

      9445c9cc6b074896546c60dfff4deefd22445b80d9fabad7f45aab6f1c3e9d2fca38dcbb565563f61603d1dc7aaa188d961e8315bcf3145c446f80360e7879f3

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks