General

  • Target

    0b71b4f2d66f03ea06305f09f2cb2ee2150fcb1577a697fba30d8d3e74b25dd2

  • Size

    101KB

  • Sample

    220212-j5emxsaaa2

  • MD5

    a91f79db53e269f43dd5e5077928817d

  • SHA1

    865f324ef5d232754f6585a261f608ab86c289e0

  • SHA256

    0b71b4f2d66f03ea06305f09f2cb2ee2150fcb1577a697fba30d8d3e74b25dd2

  • SHA512

    d9f781bd9adfdf3338891ead4f72803cd44b9515e7439357f8b80fc2aaf4d3985b4b27f64792d2163b2c783579727c2636e13387f492ee380ab51164b6866213

Malware Config

Targets

    • Target

      0b71b4f2d66f03ea06305f09f2cb2ee2150fcb1577a697fba30d8d3e74b25dd2

    • Size

      101KB

    • MD5

      a91f79db53e269f43dd5e5077928817d

    • SHA1

      865f324ef5d232754f6585a261f608ab86c289e0

    • SHA256

      0b71b4f2d66f03ea06305f09f2cb2ee2150fcb1577a697fba30d8d3e74b25dd2

    • SHA512

      d9f781bd9adfdf3338891ead4f72803cd44b9515e7439357f8b80fc2aaf4d3985b4b27f64792d2163b2c783579727c2636e13387f492ee380ab51164b6866213

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks