General

  • Target

    0bd152ba7112725f0ba1c614a449df3f5bb4ad94eea831511a111f07fb458e63

  • Size

    99KB

  • Sample

    220212-jx1keshhb8

  • MD5

    4effc4f5dc9e2ca5c3f0bafc8b8c3943

  • SHA1

    b90502ff2a879ecbbaa12f7b0401d374fe81caf6

  • SHA256

    0bd152ba7112725f0ba1c614a449df3f5bb4ad94eea831511a111f07fb458e63

  • SHA512

    aae490a66b295c133486db4a52936c5c1eedf230d028a516852ba022dad1f0b43caabb7c7ef0d6a5a6508792cbb2b574242b51c4ad8e3f7be89e14c721357e26

Malware Config

Targets

    • Target

      0bd152ba7112725f0ba1c614a449df3f5bb4ad94eea831511a111f07fb458e63

    • Size

      99KB

    • MD5

      4effc4f5dc9e2ca5c3f0bafc8b8c3943

    • SHA1

      b90502ff2a879ecbbaa12f7b0401d374fe81caf6

    • SHA256

      0bd152ba7112725f0ba1c614a449df3f5bb4ad94eea831511a111f07fb458e63

    • SHA512

      aae490a66b295c133486db4a52936c5c1eedf230d028a516852ba022dad1f0b43caabb7c7ef0d6a5a6508792cbb2b574242b51c4ad8e3f7be89e14c721357e26

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks