General

  • Target

    0d5528fe2890f8451a9ea3c1b70878b2a9f1787769500932f78be2d419b0c17a

  • Size

    89KB

  • Sample

    220212-jcvhnsheh2

  • MD5

    b4af6c589f78a3798c5d8db01e29b5e9

  • SHA1

    5bf902599a1d23da28ab33afc9ad9aeab7a0df25

  • SHA256

    0d5528fe2890f8451a9ea3c1b70878b2a9f1787769500932f78be2d419b0c17a

  • SHA512

    e523eb5d871b834be35539bbf9056ea4e98f34dd30a2a40392ab144bf5391f80872a3e274ec5246140f09fecbaddb07f3355b1ff280c0aeb492031eb6faa515c

Malware Config

Targets

    • Target

      0d5528fe2890f8451a9ea3c1b70878b2a9f1787769500932f78be2d419b0c17a

    • Size

      89KB

    • MD5

      b4af6c589f78a3798c5d8db01e29b5e9

    • SHA1

      5bf902599a1d23da28ab33afc9ad9aeab7a0df25

    • SHA256

      0d5528fe2890f8451a9ea3c1b70878b2a9f1787769500932f78be2d419b0c17a

    • SHA512

      e523eb5d871b834be35539bbf9056ea4e98f34dd30a2a40392ab144bf5391f80872a3e274ec5246140f09fecbaddb07f3355b1ff280c0aeb492031eb6faa515c

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks