General

  • Target

    0d194c8a8ebdd7f0e73abc64efd654e92231b569df66ac7b07935b66b36461af

  • Size

    60KB

  • Sample

    220212-jfza2abbgk

  • MD5

    40184919d66f200ee106e75f4f5039ba

  • SHA1

    93e01429a7f34962d150d276f9445622fd8878a0

  • SHA256

    0d194c8a8ebdd7f0e73abc64efd654e92231b569df66ac7b07935b66b36461af

  • SHA512

    f64f29498390dcf24b57c07b7b1f31cebed22c3cafa069cb19df943c3463a0fbb39c6a213ef2e6f28c456108898485ce37c0b1e4d7d81cf57ce3419dbed47816

Malware Config

Targets

    • Target

      0d194c8a8ebdd7f0e73abc64efd654e92231b569df66ac7b07935b66b36461af

    • Size

      60KB

    • MD5

      40184919d66f200ee106e75f4f5039ba

    • SHA1

      93e01429a7f34962d150d276f9445622fd8878a0

    • SHA256

      0d194c8a8ebdd7f0e73abc64efd654e92231b569df66ac7b07935b66b36461af

    • SHA512

      f64f29498390dcf24b57c07b7b1f31cebed22c3cafa069cb19df943c3463a0fbb39c6a213ef2e6f28c456108898485ce37c0b1e4d7d81cf57ce3419dbed47816

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks