General

  • Target

    0c6912995f6fdbd78fb7ad70a3c642c195e4391f75295e32e1fc0916b4e7fc44

  • Size

    92KB

  • Sample

    220212-jrdhpshgd7

  • MD5

    cb6e65e37366e138f8b5087cb756eaa6

  • SHA1

    4544ba23005f87c87579bee692ba0432386b1465

  • SHA256

    0c6912995f6fdbd78fb7ad70a3c642c195e4391f75295e32e1fc0916b4e7fc44

  • SHA512

    08045a87c996948885d0684233fdc4834dcf3ac43da8f9aeddf2d2eb5b729a07893646663d5e3b3a206a3852dd06cf9bb8b16a775f41030441c483a15775554a

Malware Config

Targets

    • Target

      0c6912995f6fdbd78fb7ad70a3c642c195e4391f75295e32e1fc0916b4e7fc44

    • Size

      92KB

    • MD5

      cb6e65e37366e138f8b5087cb756eaa6

    • SHA1

      4544ba23005f87c87579bee692ba0432386b1465

    • SHA256

      0c6912995f6fdbd78fb7ad70a3c642c195e4391f75295e32e1fc0916b4e7fc44

    • SHA512

      08045a87c996948885d0684233fdc4834dcf3ac43da8f9aeddf2d2eb5b729a07893646663d5e3b3a206a3852dd06cf9bb8b16a775f41030441c483a15775554a

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks