General

  • Target

    0d517018f1f85422bfc247bc44b97e307c4ab0bf766999f5247c09718d9d363e

  • Size

    191KB

  • Sample

    220212-jc2lzsheh5

  • MD5

    d7ae5937f976fd5d60cb2a695eb628f6

  • SHA1

    8bb40709218ae3af3b90bc69a87318eff770ca17

  • SHA256

    0d517018f1f85422bfc247bc44b97e307c4ab0bf766999f5247c09718d9d363e

  • SHA512

    b2cc7f1b235fde4438698ad39712d86ee019316a0935656ff01d85f34f00415dde2bd72e18f20a621da9cde57934c5233e9264a6392ab1277086d260a95429c7

Malware Config

Targets

    • Target

      0d517018f1f85422bfc247bc44b97e307c4ab0bf766999f5247c09718d9d363e

    • Size

      191KB

    • MD5

      d7ae5937f976fd5d60cb2a695eb628f6

    • SHA1

      8bb40709218ae3af3b90bc69a87318eff770ca17

    • SHA256

      0d517018f1f85422bfc247bc44b97e307c4ab0bf766999f5247c09718d9d363e

    • SHA512

      b2cc7f1b235fde4438698ad39712d86ee019316a0935656ff01d85f34f00415dde2bd72e18f20a621da9cde57934c5233e9264a6392ab1277086d260a95429c7

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks