General

  • Target

    0d02af89f980d2126637a275950193cd70c1cbbe3f51de096142a37c002330f7

  • Size

    150KB

  • Sample

    220212-jg5jfahfd6

  • MD5

    81668b5542ac253625bea6e7a195a6db

  • SHA1

    f2c0dd805f567c05d80280a8a5c48a3843d5bfb1

  • SHA256

    0d02af89f980d2126637a275950193cd70c1cbbe3f51de096142a37c002330f7

  • SHA512

    a5c9c45e1e31155aeaac5fb63500867bca9edacd6a126c22f14b4c79fe22a6d7acf0625e60d18ca8e313c32db8968c6c429f6dd798ef3e8e5edca3100fb8fb3a

Malware Config

Targets

    • Target

      0d02af89f980d2126637a275950193cd70c1cbbe3f51de096142a37c002330f7

    • Size

      150KB

    • MD5

      81668b5542ac253625bea6e7a195a6db

    • SHA1

      f2c0dd805f567c05d80280a8a5c48a3843d5bfb1

    • SHA256

      0d02af89f980d2126637a275950193cd70c1cbbe3f51de096142a37c002330f7

    • SHA512

      a5c9c45e1e31155aeaac5fb63500867bca9edacd6a126c22f14b4c79fe22a6d7acf0625e60d18ca8e313c32db8968c6c429f6dd798ef3e8e5edca3100fb8fb3a

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks