General

  • Target

    0d314fba2e6c6251b5becf66e959567bb82707445d58a3d522544e6162aaec10

  • Size

    99KB

  • Sample

    220212-jeqx9shfa7

  • MD5

    f168edd3a72720aa9d342283291bd14c

  • SHA1

    121fafd6538d9a49ccbe69fdc93d21dc92d27386

  • SHA256

    0d314fba2e6c6251b5becf66e959567bb82707445d58a3d522544e6162aaec10

  • SHA512

    91440c638f12f2514bbfdecb0b210472c7b8b85d39fc42b15f6f855f50bc767efe3dd6f2c2e04992f2670e843745f7bdbcc36cda99a8b2c9c922f71f1f6c2925

Malware Config

Targets

    • Target

      0d314fba2e6c6251b5becf66e959567bb82707445d58a3d522544e6162aaec10

    • Size

      99KB

    • MD5

      f168edd3a72720aa9d342283291bd14c

    • SHA1

      121fafd6538d9a49ccbe69fdc93d21dc92d27386

    • SHA256

      0d314fba2e6c6251b5becf66e959567bb82707445d58a3d522544e6162aaec10

    • SHA512

      91440c638f12f2514bbfdecb0b210472c7b8b85d39fc42b15f6f855f50bc767efe3dd6f2c2e04992f2670e843745f7bdbcc36cda99a8b2c9c922f71f1f6c2925

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks