General

  • Target

    0d88a4c59372e0a2006d0900573108c00d46ffe977872130df59f797be875986

  • Size

    35KB

  • Sample

    220212-jakkpahee3

  • MD5

    4901d1b9e3d2c0f9a605fcb265e14815

  • SHA1

    b89aa4912780a4ed8be74a29964ea7aa873af6fe

  • SHA256

    0d88a4c59372e0a2006d0900573108c00d46ffe977872130df59f797be875986

  • SHA512

    2425516c810d2468c1abf7a8cb60e61c817ad4adab3d118ddaa0738fcd5d0d6c6b6cd4aa8696bccb8cb804863deda739c5f3ca5231fb797b17ff202c936d1946

Malware Config

Targets

    • Target

      0d88a4c59372e0a2006d0900573108c00d46ffe977872130df59f797be875986

    • Size

      35KB

    • MD5

      4901d1b9e3d2c0f9a605fcb265e14815

    • SHA1

      b89aa4912780a4ed8be74a29964ea7aa873af6fe

    • SHA256

      0d88a4c59372e0a2006d0900573108c00d46ffe977872130df59f797be875986

    • SHA512

      2425516c810d2468c1abf7a8cb60e61c817ad4adab3d118ddaa0738fcd5d0d6c6b6cd4aa8696bccb8cb804863deda739c5f3ca5231fb797b17ff202c936d1946

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks