General

  • Target

    0b7797b7c104eb2cf3c0fc147b603ddd43fbaeb5abce8014aeaa38d8b32fcb00

  • Size

    36KB

  • Sample

    220212-j4v9aabefq

  • MD5

    d6e7f3a244a47ebe33ff9b2df1f2234f

  • SHA1

    865562778e0aabf83dd88712d5ed8f8347370cfb

  • SHA256

    0b7797b7c104eb2cf3c0fc147b603ddd43fbaeb5abce8014aeaa38d8b32fcb00

  • SHA512

    986d985558854f5db40bd82b00770ac06f1264f195aadc4f94af771381576963a6c4ab1a73122d222ef8a0dff293cacb81d11ba8bc5fe3b27aa63a9156bbfd04

Malware Config

Targets

    • Target

      0b7797b7c104eb2cf3c0fc147b603ddd43fbaeb5abce8014aeaa38d8b32fcb00

    • Size

      36KB

    • MD5

      d6e7f3a244a47ebe33ff9b2df1f2234f

    • SHA1

      865562778e0aabf83dd88712d5ed8f8347370cfb

    • SHA256

      0b7797b7c104eb2cf3c0fc147b603ddd43fbaeb5abce8014aeaa38d8b32fcb00

    • SHA512

      986d985558854f5db40bd82b00770ac06f1264f195aadc4f94af771381576963a6c4ab1a73122d222ef8a0dff293cacb81d11ba8bc5fe3b27aa63a9156bbfd04

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks