General

  • Target

    0e74094fe9d015752a84fef138b5aa316f7098ef22a12f87a30ea43b50515f38

  • Size

    36KB

  • Sample

    220212-hxz38aahdp

  • MD5

    3cbd26e9b5e86716bd2e2c18cda022a0

  • SHA1

    99425ae61d3c8a976bcd67728e768c26d14c63af

  • SHA256

    0e74094fe9d015752a84fef138b5aa316f7098ef22a12f87a30ea43b50515f38

  • SHA512

    f8faafe8fef370db1451f6a457144241b891c828ed4fae3b61e54d5c218be46146d817a6677964659cc9771e02b34e75073ec948be241820225ecdea3b6698eb

Malware Config

Targets

    • Target

      0e74094fe9d015752a84fef138b5aa316f7098ef22a12f87a30ea43b50515f38

    • Size

      36KB

    • MD5

      3cbd26e9b5e86716bd2e2c18cda022a0

    • SHA1

      99425ae61d3c8a976bcd67728e768c26d14c63af

    • SHA256

      0e74094fe9d015752a84fef138b5aa316f7098ef22a12f87a30ea43b50515f38

    • SHA512

      f8faafe8fef370db1451f6a457144241b891c828ed4fae3b61e54d5c218be46146d817a6677964659cc9771e02b34e75073ec948be241820225ecdea3b6698eb

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks