General

  • Target

    0c0d6931210776cae8c3b428e81c7f9b54034750c5d2552341f4a82a3484ab5a

  • Size

    60KB

  • Sample

    220212-jvha3abdfl

  • MD5

    601cd69fe8641d28f847ea638e0e2523

  • SHA1

    8b52f880097f48d899c202cd73d9dea76be99d57

  • SHA256

    0c0d6931210776cae8c3b428e81c7f9b54034750c5d2552341f4a82a3484ab5a

  • SHA512

    3bd037b294c5610c6a6ab99f90f780f0edf3e9f620410c60badb97262944810f5413bbd684f79c1fc46e0663c35697b7549209881063f580efcc48dabfc67ccc

Malware Config

Targets

    • Target

      0c0d6931210776cae8c3b428e81c7f9b54034750c5d2552341f4a82a3484ab5a

    • Size

      60KB

    • MD5

      601cd69fe8641d28f847ea638e0e2523

    • SHA1

      8b52f880097f48d899c202cd73d9dea76be99d57

    • SHA256

      0c0d6931210776cae8c3b428e81c7f9b54034750c5d2552341f4a82a3484ab5a

    • SHA512

      3bd037b294c5610c6a6ab99f90f780f0edf3e9f620410c60badb97262944810f5413bbd684f79c1fc46e0663c35697b7549209881063f580efcc48dabfc67ccc

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks