General

  • Target

    0d89dffbb8c50b0e1ba5adcb22f6f3ed5c488ee808636b4258fec107e86ba842

  • Size

    101KB

  • Sample

    220212-jaflqshee2

  • MD5

    68c5c401528ecb532b9927c66642b23b

  • SHA1

    bff18fb138d0f2dbf946280d41a2906d0ab8abd2

  • SHA256

    0d89dffbb8c50b0e1ba5adcb22f6f3ed5c488ee808636b4258fec107e86ba842

  • SHA512

    9d110ff5be4f24ef57c13020597f323c27f7245f263490435047035a2131549c64b45b45a51247369988d265125e995f240b7c8dd4be3568ab0e2a8251148042

Malware Config

Targets

    • Target

      0d89dffbb8c50b0e1ba5adcb22f6f3ed5c488ee808636b4258fec107e86ba842

    • Size

      101KB

    • MD5

      68c5c401528ecb532b9927c66642b23b

    • SHA1

      bff18fb138d0f2dbf946280d41a2906d0ab8abd2

    • SHA256

      0d89dffbb8c50b0e1ba5adcb22f6f3ed5c488ee808636b4258fec107e86ba842

    • SHA512

      9d110ff5be4f24ef57c13020597f323c27f7245f263490435047035a2131549c64b45b45a51247369988d265125e995f240b7c8dd4be3568ab0e2a8251148042

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks