General

  • Target

    0d5ce60436ab7a22d310eeea01014c383859e67ccbe8cbe17d5727ffa10a8360

  • Size

    36KB

  • Sample

    220212-jb6jjsheg2

  • MD5

    ef730a58c85799f72c4d35faeec5371e

  • SHA1

    ef58222964a41bb8dc2b782afe8ffc7e762103ea

  • SHA256

    0d5ce60436ab7a22d310eeea01014c383859e67ccbe8cbe17d5727ffa10a8360

  • SHA512

    8b3fa5ad05f9c5f41f7c10eaec0cba6d53019c2513c98c09b69347b17104653803252c97764eb71c5d6cb0b1a189a4f62ea29f9eb75d4f7361d2ae0f05c13f97

Malware Config

Targets

    • Target

      0d5ce60436ab7a22d310eeea01014c383859e67ccbe8cbe17d5727ffa10a8360

    • Size

      36KB

    • MD5

      ef730a58c85799f72c4d35faeec5371e

    • SHA1

      ef58222964a41bb8dc2b782afe8ffc7e762103ea

    • SHA256

      0d5ce60436ab7a22d310eeea01014c383859e67ccbe8cbe17d5727ffa10a8360

    • SHA512

      8b3fa5ad05f9c5f41f7c10eaec0cba6d53019c2513c98c09b69347b17104653803252c97764eb71c5d6cb0b1a189a4f62ea29f9eb75d4f7361d2ae0f05c13f97

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks