General

  • Target

    0d1b43d6d361d8066f0f9f46d261de8955ec319dadf851282652be042fd45be6

  • Size

    99KB

  • Sample

    220212-jfrwyshfb6

  • MD5

    b33ceb1ff46243065a515eb902b85e69

  • SHA1

    a70a7a54f83cf4fc261ec62e918f01ccf23ccf22

  • SHA256

    0d1b43d6d361d8066f0f9f46d261de8955ec319dadf851282652be042fd45be6

  • SHA512

    ab106a381912a50642609241bfbd5909bcd4b4d7a43021cf981e0af9f25bf0601d987bee1896d87ddeaf9521cc66320c8ebc7be5df5a6ff0110be24baf83a813

Malware Config

Targets

    • Target

      0d1b43d6d361d8066f0f9f46d261de8955ec319dadf851282652be042fd45be6

    • Size

      99KB

    • MD5

      b33ceb1ff46243065a515eb902b85e69

    • SHA1

      a70a7a54f83cf4fc261ec62e918f01ccf23ccf22

    • SHA256

      0d1b43d6d361d8066f0f9f46d261de8955ec319dadf851282652be042fd45be6

    • SHA512

      ab106a381912a50642609241bfbd5909bcd4b4d7a43021cf981e0af9f25bf0601d987bee1896d87ddeaf9521cc66320c8ebc7be5df5a6ff0110be24baf83a813

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks