General

  • Target

    0ecc4e9f9c9eeb75193384ffe2931f3ca61c188e024aaf4d6d905ae4ea2e805a

  • Size

    79KB

  • Sample

    220212-htg38shcd6

  • MD5

    6f0823ba186b8ec54fc51dc8e9da001b

  • SHA1

    22377d3074c58de918acf022e0a25d87ef17b4ce

  • SHA256

    0ecc4e9f9c9eeb75193384ffe2931f3ca61c188e024aaf4d6d905ae4ea2e805a

  • SHA512

    c2d7e3cab6b88f62dc34fe87f675921ec8c269a36e26b5a09ad8d0bf51d6f19194e2a7d42c4e4e0f98864444ca10ce30c56e40f792fa23cb61b546f80f3cacb3

Malware Config

Targets

    • Target

      0ecc4e9f9c9eeb75193384ffe2931f3ca61c188e024aaf4d6d905ae4ea2e805a

    • Size

      79KB

    • MD5

      6f0823ba186b8ec54fc51dc8e9da001b

    • SHA1

      22377d3074c58de918acf022e0a25d87ef17b4ce

    • SHA256

      0ecc4e9f9c9eeb75193384ffe2931f3ca61c188e024aaf4d6d905ae4ea2e805a

    • SHA512

      c2d7e3cab6b88f62dc34fe87f675921ec8c269a36e26b5a09ad8d0bf51d6f19194e2a7d42c4e4e0f98864444ca10ce30c56e40f792fa23cb61b546f80f3cacb3

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks