General

  • Target

    0ec91b4b09fd6a8a9e296955056d854c7e0af24462081b2a8ee286edcd865ce4

  • Size

    101KB

  • Sample

    220212-htq15shcd9

  • MD5

    40f23a80503ee456c6f6ab1116ffeea2

  • SHA1

    0ad70f61c2b2226707a12af45cbd22b46eaf4911

  • SHA256

    0ec91b4b09fd6a8a9e296955056d854c7e0af24462081b2a8ee286edcd865ce4

  • SHA512

    b099255722f3e4f2e9deb4636ee15ef7fe47e3b57a0797f1e2486828e6445682b6d4665d22305e94210d037b497c8dd2b66e5290e406d6dc424d209ac8731f71

Malware Config

Targets

    • Target

      0ec91b4b09fd6a8a9e296955056d854c7e0af24462081b2a8ee286edcd865ce4

    • Size

      101KB

    • MD5

      40f23a80503ee456c6f6ab1116ffeea2

    • SHA1

      0ad70f61c2b2226707a12af45cbd22b46eaf4911

    • SHA256

      0ec91b4b09fd6a8a9e296955056d854c7e0af24462081b2a8ee286edcd865ce4

    • SHA512

      b099255722f3e4f2e9deb4636ee15ef7fe47e3b57a0797f1e2486828e6445682b6d4665d22305e94210d037b497c8dd2b66e5290e406d6dc424d209ac8731f71

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks