General

  • Target

    0cbf50536e404fd114c560451877027033e8b98d4214cba3541d21563de14f5f

  • Size

    58KB

  • Sample

    220212-jkykashfh3

  • MD5

    a243d82053a6a7e880649107ef6dfc02

  • SHA1

    01693e974defa79adb42eea4154b473292ed2606

  • SHA256

    0cbf50536e404fd114c560451877027033e8b98d4214cba3541d21563de14f5f

  • SHA512

    70b202c8bec0198d690d3d2160b0d794e239f355717d1d10e8fc55147e31f71f5d1638e15cd74b66e10221fb20228c21d7813abe50e2f08b14506407d7ec9b6a

Malware Config

Targets

    • Target

      0cbf50536e404fd114c560451877027033e8b98d4214cba3541d21563de14f5f

    • Size

      58KB

    • MD5

      a243d82053a6a7e880649107ef6dfc02

    • SHA1

      01693e974defa79adb42eea4154b473292ed2606

    • SHA256

      0cbf50536e404fd114c560451877027033e8b98d4214cba3541d21563de14f5f

    • SHA512

      70b202c8bec0198d690d3d2160b0d794e239f355717d1d10e8fc55147e31f71f5d1638e15cd74b66e10221fb20228c21d7813abe50e2f08b14506407d7ec9b6a

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks