General

  • Target

    0e478f8d32058fd87841ce1a68b3b0772a3199495b818786e3eef79bc234cd82

  • Size

    58KB

  • Sample

    220212-hzng7sahfp

  • MD5

    cfef22a5c6cce9eeb30b634a8dbd6c5b

  • SHA1

    d288d1fa0361bcac4d878ed880c802c414b7ad3d

  • SHA256

    0e478f8d32058fd87841ce1a68b3b0772a3199495b818786e3eef79bc234cd82

  • SHA512

    99831a495db696a6afb3509313203630efa70c51b5b760f4db4a585c0741f1e9a164dd288f9d081efbe8492892cc299b2230347f908410dcec32545e417795f1

Malware Config

Targets

    • Target

      0e478f8d32058fd87841ce1a68b3b0772a3199495b818786e3eef79bc234cd82

    • Size

      58KB

    • MD5

      cfef22a5c6cce9eeb30b634a8dbd6c5b

    • SHA1

      d288d1fa0361bcac4d878ed880c802c414b7ad3d

    • SHA256

      0e478f8d32058fd87841ce1a68b3b0772a3199495b818786e3eef79bc234cd82

    • SHA512

      99831a495db696a6afb3509313203630efa70c51b5b760f4db4a585c0741f1e9a164dd288f9d081efbe8492892cc299b2230347f908410dcec32545e417795f1

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks