General

  • Target

    0b32a73c6cb3e28531c22fb8da3c468283d098479e543b48dad43b09b1cef9b6

  • Size

    60KB

  • Sample

    220212-j9363sbfcm

  • MD5

    d6f30d6c48adddc5de97b7df6fa47967

  • SHA1

    264d96b72222b50754f38791aa4382ad10595565

  • SHA256

    0b32a73c6cb3e28531c22fb8da3c468283d098479e543b48dad43b09b1cef9b6

  • SHA512

    e9f381fb385b507bc71c437c94f4e242bac92ee657096a3b657cf4c43b7a7344ac1a79fb425d2eec3b24b4611a5b792623db33eb59b481333f10ac9f7792768d

Malware Config

Targets

    • Target

      0b32a73c6cb3e28531c22fb8da3c468283d098479e543b48dad43b09b1cef9b6

    • Size

      60KB

    • MD5

      d6f30d6c48adddc5de97b7df6fa47967

    • SHA1

      264d96b72222b50754f38791aa4382ad10595565

    • SHA256

      0b32a73c6cb3e28531c22fb8da3c468283d098479e543b48dad43b09b1cef9b6

    • SHA512

      e9f381fb385b507bc71c437c94f4e242bac92ee657096a3b657cf4c43b7a7344ac1a79fb425d2eec3b24b4611a5b792623db33eb59b481333f10ac9f7792768d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks