General

  • Target

    0c77f97ebcd61baaa00739b24f26793e85e71b15dc2536398c3e4d66a53a5237

  • Size

    150KB

  • Sample

    220212-jqnx2shgd4

  • MD5

    29637bbe50f53dc4cf2a6192355ee774

  • SHA1

    9ee1e4055770469eeb26071387ebe39b02cbf797

  • SHA256

    0c77f97ebcd61baaa00739b24f26793e85e71b15dc2536398c3e4d66a53a5237

  • SHA512

    ccf6473b3be46b0cf091fde4cf11e6c5ab9a25ff4089148ecc5a7d7a0eeea4f7feb103acf7d25f13e77bbf78285357942289a2bfb0b5765c8827ff1c8988fe59

Malware Config

Targets

    • Target

      0c77f97ebcd61baaa00739b24f26793e85e71b15dc2536398c3e4d66a53a5237

    • Size

      150KB

    • MD5

      29637bbe50f53dc4cf2a6192355ee774

    • SHA1

      9ee1e4055770469eeb26071387ebe39b02cbf797

    • SHA256

      0c77f97ebcd61baaa00739b24f26793e85e71b15dc2536398c3e4d66a53a5237

    • SHA512

      ccf6473b3be46b0cf091fde4cf11e6c5ab9a25ff4089148ecc5a7d7a0eeea4f7feb103acf7d25f13e77bbf78285357942289a2bfb0b5765c8827ff1c8988fe59

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks