General

  • Target

    0ceb940beb21c0cfdec33a2ad8e682cac46079d9278d5f77e845cc91c0fcca09

  • Size

    100KB

  • Sample

    220212-jh6swsbcan

  • MD5

    f524ce1c6d55b18dcd908178f0d40458

  • SHA1

    bbe54fdb21af247a701d640e6599c4b266fd5177

  • SHA256

    0ceb940beb21c0cfdec33a2ad8e682cac46079d9278d5f77e845cc91c0fcca09

  • SHA512

    4c224b1cf54404e7b2b9860aa8a8648242c0aa90da36a05c2b4e638ee4f74703670de4a7cc69aa8808a063ece313dbc5e9eb1b52397bc54b55249d9b6cf3d4db

Malware Config

Targets

    • Target

      0ceb940beb21c0cfdec33a2ad8e682cac46079d9278d5f77e845cc91c0fcca09

    • Size

      100KB

    • MD5

      f524ce1c6d55b18dcd908178f0d40458

    • SHA1

      bbe54fdb21af247a701d640e6599c4b266fd5177

    • SHA256

      0ceb940beb21c0cfdec33a2ad8e682cac46079d9278d5f77e845cc91c0fcca09

    • SHA512

      4c224b1cf54404e7b2b9860aa8a8648242c0aa90da36a05c2b4e638ee4f74703670de4a7cc69aa8808a063ece313dbc5e9eb1b52397bc54b55249d9b6cf3d4db

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks