General

  • Target

    0ea34ca85a8ab7c0e40371b4286ed43572a96ffe3615162261a9768daebfb20a

  • Size

    99KB

  • Sample

    220212-hvq3jahcf6

  • MD5

    95805c9a104ffde91f59ad37a2e477b5

  • SHA1

    fa1b8bcfaef21c3c002a1725ac94a81647ece74b

  • SHA256

    0ea34ca85a8ab7c0e40371b4286ed43572a96ffe3615162261a9768daebfb20a

  • SHA512

    77343e285b0f5fe8d5080cfe96359912cf6f88da6f354a6415bee16cc06df4f51f4f446341b44341dc78ba2544a990a405d4f8afa9ebe68597da6390a46d4abc

Malware Config

Targets

    • Target

      0ea34ca85a8ab7c0e40371b4286ed43572a96ffe3615162261a9768daebfb20a

    • Size

      99KB

    • MD5

      95805c9a104ffde91f59ad37a2e477b5

    • SHA1

      fa1b8bcfaef21c3c002a1725ac94a81647ece74b

    • SHA256

      0ea34ca85a8ab7c0e40371b4286ed43572a96ffe3615162261a9768daebfb20a

    • SHA512

      77343e285b0f5fe8d5080cfe96359912cf6f88da6f354a6415bee16cc06df4f51f4f446341b44341dc78ba2544a990a405d4f8afa9ebe68597da6390a46d4abc

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks