General

  • Target

    0d31d429c66960623d9bf1252bd5939a94a4b5502a1cfbb7672c43c491dfa695

  • Size

    216KB

  • Sample

    220212-jelnjshfa5

  • MD5

    1ab1d666c3a70e3590f8afbd871755de

  • SHA1

    0a4dae8245b663f2b1b990cb54f8d712e4c4a352

  • SHA256

    0d31d429c66960623d9bf1252bd5939a94a4b5502a1cfbb7672c43c491dfa695

  • SHA512

    9fc9d848e18a87c511930fba542193fe61c6c1bd3eae466ccbfa7d4b8a9252dc788e71b248bae4347ee4792af9279631d56fccbb38a5dafb0b6e166cd440081d

Malware Config

Targets

    • Target

      0d31d429c66960623d9bf1252bd5939a94a4b5502a1cfbb7672c43c491dfa695

    • Size

      216KB

    • MD5

      1ab1d666c3a70e3590f8afbd871755de

    • SHA1

      0a4dae8245b663f2b1b990cb54f8d712e4c4a352

    • SHA256

      0d31d429c66960623d9bf1252bd5939a94a4b5502a1cfbb7672c43c491dfa695

    • SHA512

      9fc9d848e18a87c511930fba542193fe61c6c1bd3eae466ccbfa7d4b8a9252dc788e71b248bae4347ee4792af9279631d56fccbb38a5dafb0b6e166cd440081d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks