General

  • Target

    0e44238599f48d3bbdd1af565ef29193955a12f196c9f5cd0c7e1ca51c5fa31f

  • Size

    176KB

  • Sample

    220212-hz21lahdb2

  • MD5

    d1c753a82fc8d2bcc975ff186786387f

  • SHA1

    458a9ab0f4c5fdbe53f08df2f0fcf6ec733a8d2b

  • SHA256

    0e44238599f48d3bbdd1af565ef29193955a12f196c9f5cd0c7e1ca51c5fa31f

  • SHA512

    c54c62ee940706b8b318097fd829cf0c9914f931f2e0738d411948ec1cf5e2b554a16903ccba64c05f179a15529d12a5309173f7bb082c1d97bae844faa0c136

Malware Config

Targets

    • Target

      0e44238599f48d3bbdd1af565ef29193955a12f196c9f5cd0c7e1ca51c5fa31f

    • Size

      176KB

    • MD5

      d1c753a82fc8d2bcc975ff186786387f

    • SHA1

      458a9ab0f4c5fdbe53f08df2f0fcf6ec733a8d2b

    • SHA256

      0e44238599f48d3bbdd1af565ef29193955a12f196c9f5cd0c7e1ca51c5fa31f

    • SHA512

      c54c62ee940706b8b318097fd829cf0c9914f931f2e0738d411948ec1cf5e2b554a16903ccba64c05f179a15529d12a5309173f7bb082c1d97bae844faa0c136

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks