General

  • Target

    0ec566f3085be04361b949cdb0d65e8e0dd05639781c73110fbd30a89050c472

  • Size

    99KB

  • Sample

    220212-htvz4ahce2

  • MD5

    498e69e589e1e56dd29912746688a73e

  • SHA1

    eca4c790eb5285e7bbefea472a4b3958378f2183

  • SHA256

    0ec566f3085be04361b949cdb0d65e8e0dd05639781c73110fbd30a89050c472

  • SHA512

    5cc6a5b29ca25527b38dc911949505444875e8b71b4b928373a938ded7de06e582b95f330aa36941ff410d15add4892c2b56a2674540d69b0edcb95c663f5a68

Malware Config

Targets

    • Target

      0ec566f3085be04361b949cdb0d65e8e0dd05639781c73110fbd30a89050c472

    • Size

      99KB

    • MD5

      498e69e589e1e56dd29912746688a73e

    • SHA1

      eca4c790eb5285e7bbefea472a4b3958378f2183

    • SHA256

      0ec566f3085be04361b949cdb0d65e8e0dd05639781c73110fbd30a89050c472

    • SHA512

      5cc6a5b29ca25527b38dc911949505444875e8b71b4b928373a938ded7de06e582b95f330aa36941ff410d15add4892c2b56a2674540d69b0edcb95c663f5a68

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks