General

  • Target

    0d86ac3ce6406aa9283e326c3681bebd614579d496e48fc8cb0417e2bf07c545

  • Size

    58KB

  • Sample

    220212-jarn1ahee4

  • MD5

    e726bd2dd34f2098669cd4ac08c2a75e

  • SHA1

    f0d4e912bd786fee8ca21ef29ead0eb841733f64

  • SHA256

    0d86ac3ce6406aa9283e326c3681bebd614579d496e48fc8cb0417e2bf07c545

  • SHA512

    2249a5fdbd986fd597b0e26cad4b3d6bb3e3562a2eddb6d5dc5aafdf1a2dfddbab9831424413c615f6654fc8b16258124ea036bd95f90a707668153bce995d5f

Malware Config

Targets

    • Target

      0d86ac3ce6406aa9283e326c3681bebd614579d496e48fc8cb0417e2bf07c545

    • Size

      58KB

    • MD5

      e726bd2dd34f2098669cd4ac08c2a75e

    • SHA1

      f0d4e912bd786fee8ca21ef29ead0eb841733f64

    • SHA256

      0d86ac3ce6406aa9283e326c3681bebd614579d496e48fc8cb0417e2bf07c545

    • SHA512

      2249a5fdbd986fd597b0e26cad4b3d6bb3e3562a2eddb6d5dc5aafdf1a2dfddbab9831424413c615f6654fc8b16258124ea036bd95f90a707668153bce995d5f

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks