General

  • Target

    0be534a912b302ee0e1051c758b5de9dabb0ee29ff2fd133ad34cec9e1ba6510

  • Size

    35KB

  • Sample

    220212-jw15kabdgr

  • MD5

    8817baea6ce000f262b717d5ef1932e5

  • SHA1

    21ecb146ec0be79920e1cd148b6a2b9b6929d089

  • SHA256

    0be534a912b302ee0e1051c758b5de9dabb0ee29ff2fd133ad34cec9e1ba6510

  • SHA512

    c02574cc6e7a5106d0742e8496e3662bb3af4366462eddc13aef50687bea6d3b36aae9c2d945aac5ae5f7cce90eb01a4a19281fb4ae9bb78e772b78ac94d3343

Malware Config

Targets

    • Target

      0be534a912b302ee0e1051c758b5de9dabb0ee29ff2fd133ad34cec9e1ba6510

    • Size

      35KB

    • MD5

      8817baea6ce000f262b717d5ef1932e5

    • SHA1

      21ecb146ec0be79920e1cd148b6a2b9b6929d089

    • SHA256

      0be534a912b302ee0e1051c758b5de9dabb0ee29ff2fd133ad34cec9e1ba6510

    • SHA512

      c02574cc6e7a5106d0742e8496e3662bb3af4366462eddc13aef50687bea6d3b36aae9c2d945aac5ae5f7cce90eb01a4a19281fb4ae9bb78e772b78ac94d3343

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks