General

  • Target

    0b767c6fe2a1854516d72462b19a0769d23ad629731e83a532e23ec58618b6cb

  • Size

    80KB

  • Sample

    220212-j41h1abefr

  • MD5

    4eb3e27115e3754a8111a1f5bf0eb0a1

  • SHA1

    c42aa4985311759948cf4418dde865633bc32479

  • SHA256

    0b767c6fe2a1854516d72462b19a0769d23ad629731e83a532e23ec58618b6cb

  • SHA512

    7c656473ced72738b810d47fcbe460c6fb9425a515ab670d568e62f840d2b14b51481c8bca37be01e28e10e07b0da786b31bc1f80eebffc08545d8a9cd8108f0

Malware Config

Targets

    • Target

      0b767c6fe2a1854516d72462b19a0769d23ad629731e83a532e23ec58618b6cb

    • Size

      80KB

    • MD5

      4eb3e27115e3754a8111a1f5bf0eb0a1

    • SHA1

      c42aa4985311759948cf4418dde865633bc32479

    • SHA256

      0b767c6fe2a1854516d72462b19a0769d23ad629731e83a532e23ec58618b6cb

    • SHA512

      7c656473ced72738b810d47fcbe460c6fb9425a515ab670d568e62f840d2b14b51481c8bca37be01e28e10e07b0da786b31bc1f80eebffc08545d8a9cd8108f0

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks