General

  • Target

    0d268c4c98b9d314cd7bffc6e8cf34b81b9910390ff4227c2f5faff4d59c0b52

  • Size

    99KB

  • Sample

    220212-jfhy2shfb4

  • MD5

    c21d7954201a15cacb6c4e82d9b808a1

  • SHA1

    7902d4f2221988864526f364fc83db666ccb9b9d

  • SHA256

    0d268c4c98b9d314cd7bffc6e8cf34b81b9910390ff4227c2f5faff4d59c0b52

  • SHA512

    08114ec7d3f97e790f18e4cf44c5fc91139040594b013c050d4815eda6f3d623200785bc95ececa642a9c6f4b6029aca7f275589948c52bf660f7780f516845d

Malware Config

Targets

    • Target

      0d268c4c98b9d314cd7bffc6e8cf34b81b9910390ff4227c2f5faff4d59c0b52

    • Size

      99KB

    • MD5

      c21d7954201a15cacb6c4e82d9b808a1

    • SHA1

      7902d4f2221988864526f364fc83db666ccb9b9d

    • SHA256

      0d268c4c98b9d314cd7bffc6e8cf34b81b9910390ff4227c2f5faff4d59c0b52

    • SHA512

      08114ec7d3f97e790f18e4cf44c5fc91139040594b013c050d4815eda6f3d623200785bc95ececa642a9c6f4b6029aca7f275589948c52bf660f7780f516845d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks