General

  • Target

    0e725990c4b037c1c4e8b0566bdbb24c3373fc14132218cd23a92415e72cc3bc

  • Size

    36KB

  • Sample

    220212-hx426shch7

  • MD5

    ecf732d0110d7b3236a1ad4e3dbe39dc

  • SHA1

    bfc404e8ba25d0341187c71e8299c42bd01200ed

  • SHA256

    0e725990c4b037c1c4e8b0566bdbb24c3373fc14132218cd23a92415e72cc3bc

  • SHA512

    b921dbd88659fc42f8788f485422251077d7b3e22ad9ad84455d6e59f120a2e3f97f6816c250984d125865b8883d74f4b52e3fb9adff7b114dffae8743db37a0

Malware Config

Targets

    • Target

      0e725990c4b037c1c4e8b0566bdbb24c3373fc14132218cd23a92415e72cc3bc

    • Size

      36KB

    • MD5

      ecf732d0110d7b3236a1ad4e3dbe39dc

    • SHA1

      bfc404e8ba25d0341187c71e8299c42bd01200ed

    • SHA256

      0e725990c4b037c1c4e8b0566bdbb24c3373fc14132218cd23a92415e72cc3bc

    • SHA512

      b921dbd88659fc42f8788f485422251077d7b3e22ad9ad84455d6e59f120a2e3f97f6816c250984d125865b8883d74f4b52e3fb9adff7b114dffae8743db37a0

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks