General

  • Target

    0d642371026adc5236122193eb26bf594e15b7343fe25f2233ebff764141ee2c

  • Size

    36KB

  • Sample

    220212-jb19tshef8

  • MD5

    4432c31f6af38f344a9a1df4c1e1d203

  • SHA1

    2a1e3f4a0212b9f6932b3aca6e6b2bc1f0d7111b

  • SHA256

    0d642371026adc5236122193eb26bf594e15b7343fe25f2233ebff764141ee2c

  • SHA512

    dcd69403d5870112590531883f67d8691a15471b1a7bc075d37f7376f512cdc2eb0cfc601fcd1fba31a9e5bb9029326994c929260dc4584e2308a0136a5c5428

Malware Config

Targets

    • Target

      0d642371026adc5236122193eb26bf594e15b7343fe25f2233ebff764141ee2c

    • Size

      36KB

    • MD5

      4432c31f6af38f344a9a1df4c1e1d203

    • SHA1

      2a1e3f4a0212b9f6932b3aca6e6b2bc1f0d7111b

    • SHA256

      0d642371026adc5236122193eb26bf594e15b7343fe25f2233ebff764141ee2c

    • SHA512

      dcd69403d5870112590531883f67d8691a15471b1a7bc075d37f7376f512cdc2eb0cfc601fcd1fba31a9e5bb9029326994c929260dc4584e2308a0136a5c5428

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks