General

  • Target

    0ca8c23ee5b7bd980233b98b04e23ff6a7d0379c8abafc320ff4af91586877e8

  • Size

    36KB

  • Sample

    220212-jl9zqahga5

  • MD5

    33acc8d3730de483c8bfc4d5025131e6

  • SHA1

    115a7b632c0d6d236fd5313f5f3a4e32d6cfd1da

  • SHA256

    0ca8c23ee5b7bd980233b98b04e23ff6a7d0379c8abafc320ff4af91586877e8

  • SHA512

    fefee9b6aa74e56cb5d120e7e76e05873eb16b0897b7b12be5e06cd00a75ea2da1a6d8b52ca64053c6b57582096cf3fbe461454220b988f977b18df4cb4537a2

Malware Config

Targets

    • Target

      0ca8c23ee5b7bd980233b98b04e23ff6a7d0379c8abafc320ff4af91586877e8

    • Size

      36KB

    • MD5

      33acc8d3730de483c8bfc4d5025131e6

    • SHA1

      115a7b632c0d6d236fd5313f5f3a4e32d6cfd1da

    • SHA256

      0ca8c23ee5b7bd980233b98b04e23ff6a7d0379c8abafc320ff4af91586877e8

    • SHA512

      fefee9b6aa74e56cb5d120e7e76e05873eb16b0897b7b12be5e06cd00a75ea2da1a6d8b52ca64053c6b57582096cf3fbe461454220b988f977b18df4cb4537a2

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks