General

  • Target

    0b9ff5f4077eee2cc73c2d3766613cc236bcb17d22581323c645640fc7f95fe8

  • Size

    191KB

  • Sample

    220212-j1xb6sbecn

  • MD5

    8863dcaa645cd6d22f5bc9b7cb9421b4

  • SHA1

    de4e85edea2992b4b458fe0d3a07d871d479508b

  • SHA256

    0b9ff5f4077eee2cc73c2d3766613cc236bcb17d22581323c645640fc7f95fe8

  • SHA512

    105ec1f4fb00df9aed1655b8415c1c8e093e26e8d1a82353727780be710c5888ee5322bf1087d856781bd373912d4a509e91f11c567ecb0b435bd7320a683f13

Malware Config

Targets

    • Target

      0b9ff5f4077eee2cc73c2d3766613cc236bcb17d22581323c645640fc7f95fe8

    • Size

      191KB

    • MD5

      8863dcaa645cd6d22f5bc9b7cb9421b4

    • SHA1

      de4e85edea2992b4b458fe0d3a07d871d479508b

    • SHA256

      0b9ff5f4077eee2cc73c2d3766613cc236bcb17d22581323c645640fc7f95fe8

    • SHA512

      105ec1f4fb00df9aed1655b8415c1c8e093e26e8d1a82353727780be710c5888ee5322bf1087d856781bd373912d4a509e91f11c567ecb0b435bd7320a683f13

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks