General

  • Target

    0b7e52d67baff1b948eaf0ac5dc1ad8f9a094b5869db2acc73749ced8278606e

  • Size

    216KB

  • Sample

    220212-j4cryahhh2

  • MD5

    be4b1c287026c9abc546b3044318bcf8

  • SHA1

    1ea17bacf6fc40dbc45714053d4f1a16c5482798

  • SHA256

    0b7e52d67baff1b948eaf0ac5dc1ad8f9a094b5869db2acc73749ced8278606e

  • SHA512

    c56339c269ac4933c70eb86cf30b0f40f6472d1146d67a63de6599f1a33e2ccbeb91b5c1ec140c1e41f064e345887127ceabc2dc53114cb217928150e0550d46

Malware Config

Targets

    • Target

      0b7e52d67baff1b948eaf0ac5dc1ad8f9a094b5869db2acc73749ced8278606e

    • Size

      216KB

    • MD5

      be4b1c287026c9abc546b3044318bcf8

    • SHA1

      1ea17bacf6fc40dbc45714053d4f1a16c5482798

    • SHA256

      0b7e52d67baff1b948eaf0ac5dc1ad8f9a094b5869db2acc73749ced8278606e

    • SHA512

      c56339c269ac4933c70eb86cf30b0f40f6472d1146d67a63de6599f1a33e2ccbeb91b5c1ec140c1e41f064e345887127ceabc2dc53114cb217928150e0550d46

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks