General

  • Target

    0e687e9657eec6e67ef8041433e986b614f22dd36fe38fefb9bd862403f17f8e

  • Size

    192KB

  • Sample

    220212-hykd6aahem

  • MD5

    33ba192fcbfee17b86dfdab1545da663

  • SHA1

    5389e96ff6b8a490e6fede1b940722457f42fcff

  • SHA256

    0e687e9657eec6e67ef8041433e986b614f22dd36fe38fefb9bd862403f17f8e

  • SHA512

    7b3d40ef823c574bd8607f4f9787c9cbcfb514f5a0a43d872d12a23d5c629748d2770ef707d472d12b3b7fb5096843f2033979088b5fb95ce274a7e08b20c2ed

Malware Config

Targets

    • Target

      0e687e9657eec6e67ef8041433e986b614f22dd36fe38fefb9bd862403f17f8e

    • Size

      192KB

    • MD5

      33ba192fcbfee17b86dfdab1545da663

    • SHA1

      5389e96ff6b8a490e6fede1b940722457f42fcff

    • SHA256

      0e687e9657eec6e67ef8041433e986b614f22dd36fe38fefb9bd862403f17f8e

    • SHA512

      7b3d40ef823c574bd8607f4f9787c9cbcfb514f5a0a43d872d12a23d5c629748d2770ef707d472d12b3b7fb5096843f2033979088b5fb95ce274a7e08b20c2ed

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks