General

  • Target

    0c305ac166124db69b4c1032d4b8bbe5b538ab5b4a28e5e76922efc4547e4b8f

  • Size

    36KB

  • Sample

    220212-jsxyqsbddn

  • MD5

    ff6b201d79106db9e2c24f3663fe479b

  • SHA1

    44f07830f2e0844f24c975e66bece465a187481a

  • SHA256

    0c305ac166124db69b4c1032d4b8bbe5b538ab5b4a28e5e76922efc4547e4b8f

  • SHA512

    a65653b0742b6c7a04048531fe7fb8d9acc06a64c1a69ef462645bb84971be9f774b6ed962809b89cbbd49ae4cbd3cd789a422b28283bc3b4932db4c9ed90456

Malware Config

Targets

    • Target

      0c305ac166124db69b4c1032d4b8bbe5b538ab5b4a28e5e76922efc4547e4b8f

    • Size

      36KB

    • MD5

      ff6b201d79106db9e2c24f3663fe479b

    • SHA1

      44f07830f2e0844f24c975e66bece465a187481a

    • SHA256

      0c305ac166124db69b4c1032d4b8bbe5b538ab5b4a28e5e76922efc4547e4b8f

    • SHA512

      a65653b0742b6c7a04048531fe7fb8d9acc06a64c1a69ef462645bb84971be9f774b6ed962809b89cbbd49ae4cbd3cd789a422b28283bc3b4932db4c9ed90456

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks