General

  • Target

    0ce15a3443c08ffbe710f4b356325ec7eef45513ba02b7cecdc44e44c10c1091

  • Size

    99KB

  • Sample

    220212-jjrelabcbk

  • MD5

    3c3dcbe3e3cb8b23205316e3d65a2240

  • SHA1

    27d346d38865c766b3b93a00271cb65341c9cee7

  • SHA256

    0ce15a3443c08ffbe710f4b356325ec7eef45513ba02b7cecdc44e44c10c1091

  • SHA512

    e118e034c95718a1b886f70947bbf75ab51e5e3a70a76c44c596d084252b80e075a3f50fd473418e0f85604bcb8b4f12a8ad951afdd0347854722007c57cdeed

Malware Config

Targets

    • Target

      0ce15a3443c08ffbe710f4b356325ec7eef45513ba02b7cecdc44e44c10c1091

    • Size

      99KB

    • MD5

      3c3dcbe3e3cb8b23205316e3d65a2240

    • SHA1

      27d346d38865c766b3b93a00271cb65341c9cee7

    • SHA256

      0ce15a3443c08ffbe710f4b356325ec7eef45513ba02b7cecdc44e44c10c1091

    • SHA512

      e118e034c95718a1b886f70947bbf75ab51e5e3a70a76c44c596d084252b80e075a3f50fd473418e0f85604bcb8b4f12a8ad951afdd0347854722007c57cdeed

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks