General

  • Target

    0b56cdceecbb7dbadfc7c4eb961712815f8d6b6d8dc22c1e376e8a32c53eb17e

  • Size

    192KB

  • Sample

    220212-j6saeabehm

  • MD5

    c4db9c5482169211e6bbd2c95f630e4c

  • SHA1

    cb5c5f5b5cf15081c5ed9aeb2c516e6759fa4bfa

  • SHA256

    0b56cdceecbb7dbadfc7c4eb961712815f8d6b6d8dc22c1e376e8a32c53eb17e

  • SHA512

    8709ac6b15d9c8c0f3001b80b7640f376acd66f0e46b1e14c54873055d9d5d06ab0867e4b0bda7ea55b37119964d892761f46a643e3906c9c7dc6d58697aa634

Malware Config

Targets

    • Target

      0b56cdceecbb7dbadfc7c4eb961712815f8d6b6d8dc22c1e376e8a32c53eb17e

    • Size

      192KB

    • MD5

      c4db9c5482169211e6bbd2c95f630e4c

    • SHA1

      cb5c5f5b5cf15081c5ed9aeb2c516e6759fa4bfa

    • SHA256

      0b56cdceecbb7dbadfc7c4eb961712815f8d6b6d8dc22c1e376e8a32c53eb17e

    • SHA512

      8709ac6b15d9c8c0f3001b80b7640f376acd66f0e46b1e14c54873055d9d5d06ab0867e4b0bda7ea55b37119964d892761f46a643e3906c9c7dc6d58697aa634

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks