General

  • Target

    0b45e126783a51846d41db08ae332566d362a2b0772506f6931214d634b7ebaa

  • Size

    92KB

  • Sample

    220212-j77fqaaad2

  • MD5

    75671d499ddf0ed6dadb85ab8d9dcdcf

  • SHA1

    ecd0ff998d5de2ea78eeb78c5c6c086a89e83096

  • SHA256

    0b45e126783a51846d41db08ae332566d362a2b0772506f6931214d634b7ebaa

  • SHA512

    e98d141074d2e6975579b129eb7d182549b5f1ab6b950f718f526218827aeaae3586f28406a5a95ca2570cf05b13abf59b00aafbae169810302a752ff44d244d

Malware Config

Targets

    • Target

      0b45e126783a51846d41db08ae332566d362a2b0772506f6931214d634b7ebaa

    • Size

      92KB

    • MD5

      75671d499ddf0ed6dadb85ab8d9dcdcf

    • SHA1

      ecd0ff998d5de2ea78eeb78c5c6c086a89e83096

    • SHA256

      0b45e126783a51846d41db08ae332566d362a2b0772506f6931214d634b7ebaa

    • SHA512

      e98d141074d2e6975579b129eb7d182549b5f1ab6b950f718f526218827aeaae3586f28406a5a95ca2570cf05b13abf59b00aafbae169810302a752ff44d244d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks