General

  • Target

    0b495425534ea0537b902546f9abc5fae4ed19cfa89fbf65095617b53af3de25

  • Size

    150KB

  • Sample

    220212-j7z2msaac9

  • MD5

    cee5a44cb2b1545ba6281903475c01e0

  • SHA1

    7f67ea33c6732d72381ee4253538972aa3bd1abd

  • SHA256

    0b495425534ea0537b902546f9abc5fae4ed19cfa89fbf65095617b53af3de25

  • SHA512

    d8ca4b1047eb3e596e3a73fd9c9ec18e720075ebab8cdf5cf9bd1108bb97ad07a28ebb163775b78a73d5cf71a378950a88fa240f03a3d8ce0edc60a012ada014

Malware Config

Targets

    • Target

      0b495425534ea0537b902546f9abc5fae4ed19cfa89fbf65095617b53af3de25

    • Size

      150KB

    • MD5

      cee5a44cb2b1545ba6281903475c01e0

    • SHA1

      7f67ea33c6732d72381ee4253538972aa3bd1abd

    • SHA256

      0b495425534ea0537b902546f9abc5fae4ed19cfa89fbf65095617b53af3de25

    • SHA512

      d8ca4b1047eb3e596e3a73fd9c9ec18e720075ebab8cdf5cf9bd1108bb97ad07a28ebb163775b78a73d5cf71a378950a88fa240f03a3d8ce0edc60a012ada014

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks