General

  • Target

    0be5424bcd08263fa76f69c19086f23986d45a0879befaddff383780a236ab7c

  • Size

    150KB

  • Sample

    220212-jww6lshha4

  • MD5

    e462a24b45e91fd7818ad9007d0edc8a

  • SHA1

    a6d83735ed4708f1b635af121c5bcd07166a6ab6

  • SHA256

    0be5424bcd08263fa76f69c19086f23986d45a0879befaddff383780a236ab7c

  • SHA512

    f2e89b5f41470e49cefb5e6cdc50260136c841472a20efe8dd8af4e1d1fb4722022cd431508e7705b01895d5f62c578db944f7e84bb5e9f7c18214a7237ef9b2

Malware Config

Targets

    • Target

      0be5424bcd08263fa76f69c19086f23986d45a0879befaddff383780a236ab7c

    • Size

      150KB

    • MD5

      e462a24b45e91fd7818ad9007d0edc8a

    • SHA1

      a6d83735ed4708f1b635af121c5bcd07166a6ab6

    • SHA256

      0be5424bcd08263fa76f69c19086f23986d45a0879befaddff383780a236ab7c

    • SHA512

      f2e89b5f41470e49cefb5e6cdc50260136c841472a20efe8dd8af4e1d1fb4722022cd431508e7705b01895d5f62c578db944f7e84bb5e9f7c18214a7237ef9b2

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks