General

  • Target

    0e914b9c02ae0a375fda295a86704ea41352df18bafd51607b6965057952e1c2

  • Size

    80KB

  • Sample

    220212-hwm29sahbq

  • MD5

    1e28acf6d2a2cb2caa81c2bb61f39c48

  • SHA1

    544e8c8e897ae49de6a5b6fa44e1ebc702fb60b1

  • SHA256

    0e914b9c02ae0a375fda295a86704ea41352df18bafd51607b6965057952e1c2

  • SHA512

    8c9b05cb8b5bff1bd7ee1052c3c9a188c770e26a53ac79671b1ca3b5f50f0d1a907006754e60a5602519af435e912102f8df26ba042733f97c5eba07df0c9217

Malware Config

Targets

    • Target

      0e914b9c02ae0a375fda295a86704ea41352df18bafd51607b6965057952e1c2

    • Size

      80KB

    • MD5

      1e28acf6d2a2cb2caa81c2bb61f39c48

    • SHA1

      544e8c8e897ae49de6a5b6fa44e1ebc702fb60b1

    • SHA256

      0e914b9c02ae0a375fda295a86704ea41352df18bafd51607b6965057952e1c2

    • SHA512

      8c9b05cb8b5bff1bd7ee1052c3c9a188c770e26a53ac79671b1ca3b5f50f0d1a907006754e60a5602519af435e912102f8df26ba042733f97c5eba07df0c9217

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks