General

  • Target

    0e473a780d7eec9619cec57993b065c5f34f447c4ec85760c5895d2540908ba9

  • Size

    58KB

  • Sample

    220212-hzsf6aahfr

  • MD5

    f7317ce8d6b427711342bf50b2568602

  • SHA1

    d9997c8c49acd509807e204d4b5ca8c1595863a8

  • SHA256

    0e473a780d7eec9619cec57993b065c5f34f447c4ec85760c5895d2540908ba9

  • SHA512

    b2d32bc56095470c4d5aeebfe1e1375a881e77083aa52e94dcdb853bd78143cc24b2983f15f25dc1452f7a1175a6d185f5340bbf192784e095e6f7b2dac21343

Malware Config

Targets

    • Target

      0e473a780d7eec9619cec57993b065c5f34f447c4ec85760c5895d2540908ba9

    • Size

      58KB

    • MD5

      f7317ce8d6b427711342bf50b2568602

    • SHA1

      d9997c8c49acd509807e204d4b5ca8c1595863a8

    • SHA256

      0e473a780d7eec9619cec57993b065c5f34f447c4ec85760c5895d2540908ba9

    • SHA512

      b2d32bc56095470c4d5aeebfe1e1375a881e77083aa52e94dcdb853bd78143cc24b2983f15f25dc1452f7a1175a6d185f5340bbf192784e095e6f7b2dac21343

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks