General

  • Target

    0b425685ff4dc98c5c832d53763dd771baebf4bd6cd218cca4babf061a2bac76

  • Size

    92KB

  • Sample

    220212-j8zghaaae2

  • MD5

    43cf60a5cd091000e55edffa2dd239d5

  • SHA1

    942b9a262219141514f5249773cb8659c5c01ee1

  • SHA256

    0b425685ff4dc98c5c832d53763dd771baebf4bd6cd218cca4babf061a2bac76

  • SHA512

    4c5080daaff70d7bb2035bd5950773244e523f6b0fc79330c0e30aff4c817718d2ff641e05f3671c367a9ed757594a4831e06026ba25ec5ee237c3f6b24f2f14

Malware Config

Targets

    • Target

      0b425685ff4dc98c5c832d53763dd771baebf4bd6cd218cca4babf061a2bac76

    • Size

      92KB

    • MD5

      43cf60a5cd091000e55edffa2dd239d5

    • SHA1

      942b9a262219141514f5249773cb8659c5c01ee1

    • SHA256

      0b425685ff4dc98c5c832d53763dd771baebf4bd6cd218cca4babf061a2bac76

    • SHA512

      4c5080daaff70d7bb2035bd5950773244e523f6b0fc79330c0e30aff4c817718d2ff641e05f3671c367a9ed757594a4831e06026ba25ec5ee237c3f6b24f2f14

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks