General

  • Target

    0d5686eb3dd9cb3cd1afe6b1480987e110f87f5ec411ebdb859e5cdcafcf8da0

  • Size

    79KB

  • Sample

    220212-jcsdbabbbq

  • MD5

    af596dce04d3925be0dd1dc2b74351ee

  • SHA1

    cee118a8628368d6616dde48c0efa38003cd3477

  • SHA256

    0d5686eb3dd9cb3cd1afe6b1480987e110f87f5ec411ebdb859e5cdcafcf8da0

  • SHA512

    03da9d29e0efb473e49586378d57616609829f792bbe749da3746fee31f964b2b4c8a75cc070b6b729320c728cfb9b291475d475da880e3891c4fc48e096d0d9

Malware Config

Targets

    • Target

      0d5686eb3dd9cb3cd1afe6b1480987e110f87f5ec411ebdb859e5cdcafcf8da0

    • Size

      79KB

    • MD5

      af596dce04d3925be0dd1dc2b74351ee

    • SHA1

      cee118a8628368d6616dde48c0efa38003cd3477

    • SHA256

      0d5686eb3dd9cb3cd1afe6b1480987e110f87f5ec411ebdb859e5cdcafcf8da0

    • SHA512

      03da9d29e0efb473e49586378d57616609829f792bbe749da3746fee31f964b2b4c8a75cc070b6b729320c728cfb9b291475d475da880e3891c4fc48e096d0d9

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks