General

  • Target

    0d662458ff46bddc23a8d8cd7f37115096da9edd02cbe1b687a60a046193790c

  • Size

    80KB

  • Sample

    220212-jbtvrabban

  • MD5

    f7ea4ce11fa3ee815cf389b1eb107a5c

  • SHA1

    3c84f03b897f8747acfc99ec10a11d898558ab85

  • SHA256

    0d662458ff46bddc23a8d8cd7f37115096da9edd02cbe1b687a60a046193790c

  • SHA512

    31b3a6879fa5f338892b853b041c2400c422849eb893b43c460d99379ece87409bdf316a6fc034e471175677ed13d72eee1ff1b35a91110b8f811c8a8ba8d6c8

Malware Config

Targets

    • Target

      0d662458ff46bddc23a8d8cd7f37115096da9edd02cbe1b687a60a046193790c

    • Size

      80KB

    • MD5

      f7ea4ce11fa3ee815cf389b1eb107a5c

    • SHA1

      3c84f03b897f8747acfc99ec10a11d898558ab85

    • SHA256

      0d662458ff46bddc23a8d8cd7f37115096da9edd02cbe1b687a60a046193790c

    • SHA512

      31b3a6879fa5f338892b853b041c2400c422849eb893b43c460d99379ece87409bdf316a6fc034e471175677ed13d72eee1ff1b35a91110b8f811c8a8ba8d6c8

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks