General

  • Target

    0ccd5c2864ef127e5cb04698e579d86f39a6224725821228a66dbf4aeb9acccd

  • Size

    80KB

  • Sample

    220212-jj7ftabcbp

  • MD5

    756ea978445a31ce5ba405807e7ef363

  • SHA1

    b358f3f94fcb56307cf517d3888dcb1af7cbba2d

  • SHA256

    0ccd5c2864ef127e5cb04698e579d86f39a6224725821228a66dbf4aeb9acccd

  • SHA512

    4ae5a04494a29edbd185ee7f45309b63df6776705eb164eefab3f3d98e62f7fa30233cdc2bc36388f212e544840100ba70b69b282499d8f605bb07643e27df2c

Malware Config

Targets

    • Target

      0ccd5c2864ef127e5cb04698e579d86f39a6224725821228a66dbf4aeb9acccd

    • Size

      80KB

    • MD5

      756ea978445a31ce5ba405807e7ef363

    • SHA1

      b358f3f94fcb56307cf517d3888dcb1af7cbba2d

    • SHA256

      0ccd5c2864ef127e5cb04698e579d86f39a6224725821228a66dbf4aeb9acccd

    • SHA512

      4ae5a04494a29edbd185ee7f45309b63df6776705eb164eefab3f3d98e62f7fa30233cdc2bc36388f212e544840100ba70b69b282499d8f605bb07643e27df2c

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks