General

  • Target

    0d5287506a0f09796727ce2cd29a3ab71f0734bbe0eb834ccd7293a2766ef4ad

  • Size

    150KB

  • Sample

    220212-jcxb9sheh3

  • MD5

    311648d1f51a5e6aa79d0d82b7e12419

  • SHA1

    537ea891f3cc383ee0ca52c544f91ebc36e0adba

  • SHA256

    0d5287506a0f09796727ce2cd29a3ab71f0734bbe0eb834ccd7293a2766ef4ad

  • SHA512

    e11ba0d6823584f16080f2fa1d2ae8f02f2c5110810627b52bc956a1de44467caaf7e92e7a469de79431f0d673444fd1bc39c73d94c31eb03f19ef42ce224b17

Malware Config

Targets

    • Target

      0d5287506a0f09796727ce2cd29a3ab71f0734bbe0eb834ccd7293a2766ef4ad

    • Size

      150KB

    • MD5

      311648d1f51a5e6aa79d0d82b7e12419

    • SHA1

      537ea891f3cc383ee0ca52c544f91ebc36e0adba

    • SHA256

      0d5287506a0f09796727ce2cd29a3ab71f0734bbe0eb834ccd7293a2766ef4ad

    • SHA512

      e11ba0d6823584f16080f2fa1d2ae8f02f2c5110810627b52bc956a1de44467caaf7e92e7a469de79431f0d673444fd1bc39c73d94c31eb03f19ef42ce224b17

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks