General

  • Target

    0c2d263df8526fa041d2d9dfe979df147a521726b333b27a32188068516f44bb

  • Size

    100KB

  • Sample

    220212-js5zcabddq

  • MD5

    690289b153a25504d55928e686b98684

  • SHA1

    dd6df5c74718ca527bf5edc99fd4a3792b59e3df

  • SHA256

    0c2d263df8526fa041d2d9dfe979df147a521726b333b27a32188068516f44bb

  • SHA512

    02e9f1a5f91020b390495e4c0cc6fdb67103ee5d018aee57765479112d150c2b2b1ec291f1989491c0bd664dba69966bdd33332243950180f1f4a30d40e0fa95

Malware Config

Targets

    • Target

      0c2d263df8526fa041d2d9dfe979df147a521726b333b27a32188068516f44bb

    • Size

      100KB

    • MD5

      690289b153a25504d55928e686b98684

    • SHA1

      dd6df5c74718ca527bf5edc99fd4a3792b59e3df

    • SHA256

      0c2d263df8526fa041d2d9dfe979df147a521726b333b27a32188068516f44bb

    • SHA512

      02e9f1a5f91020b390495e4c0cc6fdb67103ee5d018aee57765479112d150c2b2b1ec291f1989491c0bd664dba69966bdd33332243950180f1f4a30d40e0fa95

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks