General

  • Target

    0b43c836e7241914468af3cbf7370ae5bd06d0cf5415a22fbf6de2259b188353

  • Size

    92KB

  • Sample

    220212-j8fpdsaad6

  • MD5

    9a0e4d6600f067c2509340fce2e7e224

  • SHA1

    1162cbbebf82911b072288fcb749e890fd581cf5

  • SHA256

    0b43c836e7241914468af3cbf7370ae5bd06d0cf5415a22fbf6de2259b188353

  • SHA512

    3cf7468b65c3f2a29da2679e711788d96d4bbbdad5138cbd6360a6e0a6f28b91fbde5dd882514c8b5293afde752f289e069e0dcd83fd2533dd0f55465c06d896

Malware Config

Targets

    • Target

      0b43c836e7241914468af3cbf7370ae5bd06d0cf5415a22fbf6de2259b188353

    • Size

      92KB

    • MD5

      9a0e4d6600f067c2509340fce2e7e224

    • SHA1

      1162cbbebf82911b072288fcb749e890fd581cf5

    • SHA256

      0b43c836e7241914468af3cbf7370ae5bd06d0cf5415a22fbf6de2259b188353

    • SHA512

      3cf7468b65c3f2a29da2679e711788d96d4bbbdad5138cbd6360a6e0a6f28b91fbde5dd882514c8b5293afde752f289e069e0dcd83fd2533dd0f55465c06d896

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks