General

  • Target

    0e6dba7e5aa3cb9835b88c74713050df77d4bab26abc0294dabae4abb9a810e4

  • Size

    92KB

  • Sample

    220212-hycz3shch9

  • MD5

    04e15eab9960711681c10a30ef09ee5e

  • SHA1

    cc1df50cde1c6708f3e396ff554f84da17761612

  • SHA256

    0e6dba7e5aa3cb9835b88c74713050df77d4bab26abc0294dabae4abb9a810e4

  • SHA512

    d327623883c6b5ad69ea00d09872e73bec1417005e43b3cef989213c603867cfb3df6c46e4402842edd99956bbbb2502b975bd5c0238d36264682b17275ebfb8

Malware Config

Targets

    • Target

      0e6dba7e5aa3cb9835b88c74713050df77d4bab26abc0294dabae4abb9a810e4

    • Size

      92KB

    • MD5

      04e15eab9960711681c10a30ef09ee5e

    • SHA1

      cc1df50cde1c6708f3e396ff554f84da17761612

    • SHA256

      0e6dba7e5aa3cb9835b88c74713050df77d4bab26abc0294dabae4abb9a810e4

    • SHA512

      d327623883c6b5ad69ea00d09872e73bec1417005e43b3cef989213c603867cfb3df6c46e4402842edd99956bbbb2502b975bd5c0238d36264682b17275ebfb8

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks