General

  • Target

    0c9780c01fb879ced98e8c3a6c8cfb150a55d70984e54a99d0e5f707409af3d4

  • Size

    92KB

  • Sample

    220212-jnk4dahgb5

  • MD5

    3340d7867ed468cd6dac9c028e662290

  • SHA1

    2a4e869043a8e5d7df845e281b70bbbd7a819682

  • SHA256

    0c9780c01fb879ced98e8c3a6c8cfb150a55d70984e54a99d0e5f707409af3d4

  • SHA512

    2f7c5656cc15d6093f5389726a864eb3250732093a2527ac03681195624ecb83e312103198cdb05b5d783369edece12b70d8c1fbcf47823ab7030b2537c33371

Malware Config

Targets

    • Target

      0c9780c01fb879ced98e8c3a6c8cfb150a55d70984e54a99d0e5f707409af3d4

    • Size

      92KB

    • MD5

      3340d7867ed468cd6dac9c028e662290

    • SHA1

      2a4e869043a8e5d7df845e281b70bbbd7a819682

    • SHA256

      0c9780c01fb879ced98e8c3a6c8cfb150a55d70984e54a99d0e5f707409af3d4

    • SHA512

      2f7c5656cc15d6093f5389726a864eb3250732093a2527ac03681195624ecb83e312103198cdb05b5d783369edece12b70d8c1fbcf47823ab7030b2537c33371

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks