General

  • Target

    0b91b1d579392adb694f4dbf47ac3032f2128c09672fc07931cbbb4b63789a96

  • Size

    80KB

  • Sample

    220212-j2kd1abedm

  • MD5

    dacfd47ed66fdd7c7c09bea07a5de53c

  • SHA1

    dee078ca9d4d1880b09c624c078a5a71e89d355b

  • SHA256

    0b91b1d579392adb694f4dbf47ac3032f2128c09672fc07931cbbb4b63789a96

  • SHA512

    3d72c0936a9007016ea6d00a1111b52418adfc825eb7fcdd2f42709c4372cc786df0c711d036aa04f94c4c055735e7519fcc50e0d2601fc0830ca5ea5c7c7557

Malware Config

Targets

    • Target

      0b91b1d579392adb694f4dbf47ac3032f2128c09672fc07931cbbb4b63789a96

    • Size

      80KB

    • MD5

      dacfd47ed66fdd7c7c09bea07a5de53c

    • SHA1

      dee078ca9d4d1880b09c624c078a5a71e89d355b

    • SHA256

      0b91b1d579392adb694f4dbf47ac3032f2128c09672fc07931cbbb4b63789a96

    • SHA512

      3d72c0936a9007016ea6d00a1111b52418adfc825eb7fcdd2f42709c4372cc786df0c711d036aa04f94c4c055735e7519fcc50e0d2601fc0830ca5ea5c7c7557

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks