General

  • Target

    0d13ee09eda89e74c18d76519858e1404a2190393aba1117e54635b9f59f188d

  • Size

    80KB

  • Sample

    220212-jf8vgabbgm

  • MD5

    2c385d03911df3ef8cd4c6087059c5a7

  • SHA1

    9b85cfdd9b3f8f0437265891b65ed85c85a9a65a

  • SHA256

    0d13ee09eda89e74c18d76519858e1404a2190393aba1117e54635b9f59f188d

  • SHA512

    0b96b5171de902b364c4928f7fb153a1bf8fa97a3f24c9e3b5e93ede56fc10c29f56a49cb35d75fc3f4b259efbfb40ff30fd32d2a45108807b5a5aae42d35074

Malware Config

Targets

    • Target

      0d13ee09eda89e74c18d76519858e1404a2190393aba1117e54635b9f59f188d

    • Size

      80KB

    • MD5

      2c385d03911df3ef8cd4c6087059c5a7

    • SHA1

      9b85cfdd9b3f8f0437265891b65ed85c85a9a65a

    • SHA256

      0d13ee09eda89e74c18d76519858e1404a2190393aba1117e54635b9f59f188d

    • SHA512

      0b96b5171de902b364c4928f7fb153a1bf8fa97a3f24c9e3b5e93ede56fc10c29f56a49cb35d75fc3f4b259efbfb40ff30fd32d2a45108807b5a5aae42d35074

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks