General

  • Target

    0c6d3362db685fa829299bd2a3479b61376036194d1f1abcc4432af5cbb3ce92

  • Size

    192KB

  • Sample

    220212-jq492ahgd6

  • MD5

    3ba95ab150863862d92dcb296375411d

  • SHA1

    e237980eb3897104d3089d6b9bb22e79cb345357

  • SHA256

    0c6d3362db685fa829299bd2a3479b61376036194d1f1abcc4432af5cbb3ce92

  • SHA512

    9fd8a350c51f4ae62dda2b35d29435db3dd2e7e4564907263f924eee7806fc23218075297773967a04cf1b5aee2c34c42bc604ee36d7fda55f1a63399798bff1

Malware Config

Targets

    • Target

      0c6d3362db685fa829299bd2a3479b61376036194d1f1abcc4432af5cbb3ce92

    • Size

      192KB

    • MD5

      3ba95ab150863862d92dcb296375411d

    • SHA1

      e237980eb3897104d3089d6b9bb22e79cb345357

    • SHA256

      0c6d3362db685fa829299bd2a3479b61376036194d1f1abcc4432af5cbb3ce92

    • SHA512

      9fd8a350c51f4ae62dda2b35d29435db3dd2e7e4564907263f924eee7806fc23218075297773967a04cf1b5aee2c34c42bc604ee36d7fda55f1a63399798bff1

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks