General

  • Target

    0d7ade6a99baf039ba979e45f6b84afa24811d44e24b3c6e87faab9499183b3a

  • Size

    36KB

  • Sample

    220212-ja1lxahee7

  • MD5

    36eeadbbbf07c3a3896db43cc1a60f91

  • SHA1

    4141064204fed494d8b072294e8a120a993ba4c0

  • SHA256

    0d7ade6a99baf039ba979e45f6b84afa24811d44e24b3c6e87faab9499183b3a

  • SHA512

    fb4a67a3f34a06a538d449b4576fa5dedf6aae6dcfd8bdfc3bdc0eeb274b3ef2f6a9e3286db55b5ef64f6f948123fe1cc662f59b62256aa3bea4ddf7463426e3

Malware Config

Targets

    • Target

      0d7ade6a99baf039ba979e45f6b84afa24811d44e24b3c6e87faab9499183b3a

    • Size

      36KB

    • MD5

      36eeadbbbf07c3a3896db43cc1a60f91

    • SHA1

      4141064204fed494d8b072294e8a120a993ba4c0

    • SHA256

      0d7ade6a99baf039ba979e45f6b84afa24811d44e24b3c6e87faab9499183b3a

    • SHA512

      fb4a67a3f34a06a538d449b4576fa5dedf6aae6dcfd8bdfc3bdc0eeb274b3ef2f6a9e3286db55b5ef64f6f948123fe1cc662f59b62256aa3bea4ddf7463426e3

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks