General

  • Target

    0bfce0c49bc232490835d6a9359b951278bf968a794b0d46ac6e178d7eb3756e

  • Size

    60KB

  • Sample

    220212-jv9qbabdgm

  • MD5

    476e22009f28d2d531d13d4fa12efa59

  • SHA1

    c15681556068a4c42081f08a50b52cca5a164ddc

  • SHA256

    0bfce0c49bc232490835d6a9359b951278bf968a794b0d46ac6e178d7eb3756e

  • SHA512

    5e032487f51dd016e6b50998c464bea06b581ea006de2eb57d715b2a358d6e0980cc740db191a8621daee53b4ffd0d352f847b0cad5a5fd317e2ed1820f9f477

Malware Config

Targets

    • Target

      0bfce0c49bc232490835d6a9359b951278bf968a794b0d46ac6e178d7eb3756e

    • Size

      60KB

    • MD5

      476e22009f28d2d531d13d4fa12efa59

    • SHA1

      c15681556068a4c42081f08a50b52cca5a164ddc

    • SHA256

      0bfce0c49bc232490835d6a9359b951278bf968a794b0d46ac6e178d7eb3756e

    • SHA512

      5e032487f51dd016e6b50998c464bea06b581ea006de2eb57d715b2a358d6e0980cc740db191a8621daee53b4ffd0d352f847b0cad5a5fd317e2ed1820f9f477

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks