General

  • Target

    0ba3737088544219ea9dd33842fe14f470789da07f6ed6f3877cb7171cb75a26

  • Size

    36KB

  • Sample

    220212-j1fz7abeck

  • MD5

    1eb56daedbd0678c9c1fe323aff36ee2

  • SHA1

    3406785deee9a66a76dd7358c952fb0b44dc4c0e

  • SHA256

    0ba3737088544219ea9dd33842fe14f470789da07f6ed6f3877cb7171cb75a26

  • SHA512

    7582d5723fdc808f2346148d6f87faa8c55d6aee63fbe66b76d7b5cd468bedb84901f203d8017289cbe36b5a4a0f9a3063c1c473e83e19ba838ed2ed98bff712

Malware Config

Targets

    • Target

      0ba3737088544219ea9dd33842fe14f470789da07f6ed6f3877cb7171cb75a26

    • Size

      36KB

    • MD5

      1eb56daedbd0678c9c1fe323aff36ee2

    • SHA1

      3406785deee9a66a76dd7358c952fb0b44dc4c0e

    • SHA256

      0ba3737088544219ea9dd33842fe14f470789da07f6ed6f3877cb7171cb75a26

    • SHA512

      7582d5723fdc808f2346148d6f87faa8c55d6aee63fbe66b76d7b5cd468bedb84901f203d8017289cbe36b5a4a0f9a3063c1c473e83e19ba838ed2ed98bff712

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks