General

  • Target

    0e7f5a53b6b0fbfafdc23ae9d47441e3b40cc1292f85ec06eca4a21ebc1a41da

  • Size

    99KB

  • Sample

    220212-hxq6baahdm

  • MD5

    d94ca4a57b10b4afb2f6373c0ae4b924

  • SHA1

    799810533a613e68eedd97bb2c7f599ca2c5424e

  • SHA256

    0e7f5a53b6b0fbfafdc23ae9d47441e3b40cc1292f85ec06eca4a21ebc1a41da

  • SHA512

    3c67b746fe6c3bf10181a5a000d191d64f611d222900fccaf51bc72ae18fda69d7690c7aa8934612cae7d5c645dba66e3f445bbc5b1759e508643a97fe99953b

Malware Config

Targets

    • Target

      0e7f5a53b6b0fbfafdc23ae9d47441e3b40cc1292f85ec06eca4a21ebc1a41da

    • Size

      99KB

    • MD5

      d94ca4a57b10b4afb2f6373c0ae4b924

    • SHA1

      799810533a613e68eedd97bb2c7f599ca2c5424e

    • SHA256

      0e7f5a53b6b0fbfafdc23ae9d47441e3b40cc1292f85ec06eca4a21ebc1a41da

    • SHA512

      3c67b746fe6c3bf10181a5a000d191d64f611d222900fccaf51bc72ae18fda69d7690c7aa8934612cae7d5c645dba66e3f445bbc5b1759e508643a97fe99953b

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks