General

  • Target

    0d5cacb7097f4ae717b2542ead802ade35af8760d59e010e93e349dfa5125213

  • Size

    92KB

  • Sample

    220212-jccmvsheg4

  • MD5

    37e36ce6d360ba66714e1a581df200b5

  • SHA1

    0d71d56fb24e46fa378684fe27d9f374d85d2163

  • SHA256

    0d5cacb7097f4ae717b2542ead802ade35af8760d59e010e93e349dfa5125213

  • SHA512

    e3e8bd27f1cc5bcfdcba8e3098c4d05b850876b3ca5326b9ac1c91ba414f48025d0742426481adc3b10fe28039d23454a5393a0fd31d295588e107c02dd97935

Malware Config

Targets

    • Target

      0d5cacb7097f4ae717b2542ead802ade35af8760d59e010e93e349dfa5125213

    • Size

      92KB

    • MD5

      37e36ce6d360ba66714e1a581df200b5

    • SHA1

      0d71d56fb24e46fa378684fe27d9f374d85d2163

    • SHA256

      0d5cacb7097f4ae717b2542ead802ade35af8760d59e010e93e349dfa5125213

    • SHA512

      e3e8bd27f1cc5bcfdcba8e3098c4d05b850876b3ca5326b9ac1c91ba414f48025d0742426481adc3b10fe28039d23454a5393a0fd31d295588e107c02dd97935

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks