General

  • Target

    0c13536de3e09476fc94ae594eed084eaabc6d93170674a8618ed69633693e46

  • Size

    92KB

  • Sample

    220212-jt44fahgg6

  • MD5

    3a608fc1eeb495c33e634e4d4e9ec9ca

  • SHA1

    f63f6dae0e77fcadaae501b5c7aba12537324ee5

  • SHA256

    0c13536de3e09476fc94ae594eed084eaabc6d93170674a8618ed69633693e46

  • SHA512

    ab653eb37a9bdc4292c40c29f3742bb310caa6b1f1692cdfc330bb64fdf26342bccb738bc0031ce0cfa3d6149e68bcdb80321a4bfb5508de1a0c43e2868a819c

Malware Config

Targets

    • Target

      0c13536de3e09476fc94ae594eed084eaabc6d93170674a8618ed69633693e46

    • Size

      92KB

    • MD5

      3a608fc1eeb495c33e634e4d4e9ec9ca

    • SHA1

      f63f6dae0e77fcadaae501b5c7aba12537324ee5

    • SHA256

      0c13536de3e09476fc94ae594eed084eaabc6d93170674a8618ed69633693e46

    • SHA512

      ab653eb37a9bdc4292c40c29f3742bb310caa6b1f1692cdfc330bb64fdf26342bccb738bc0031ce0cfa3d6149e68bcdb80321a4bfb5508de1a0c43e2868a819c

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks