General

  • Target

    0be278ca113ef3c1a4a0e2d55fae91c7b5e4522412c5153d14a6eb153bcf0363

  • Size

    58KB

  • Sample

    220212-jxac8shhb2

  • MD5

    cdb8306cfa96bdcab9f2f784f3d2cb66

  • SHA1

    bd7ec885b65c0f94e51b98b0863b8e189b620382

  • SHA256

    0be278ca113ef3c1a4a0e2d55fae91c7b5e4522412c5153d14a6eb153bcf0363

  • SHA512

    5998d25c0acfcc164f0c1cc63a4d08405550bd90b48566e3923c4936e99a3b9acd0d3728cef5588f22dc62ff69db06562e5abca42b1d64cf149c3e0192fee9a7

Malware Config

Targets

    • Target

      0be278ca113ef3c1a4a0e2d55fae91c7b5e4522412c5153d14a6eb153bcf0363

    • Size

      58KB

    • MD5

      cdb8306cfa96bdcab9f2f784f3d2cb66

    • SHA1

      bd7ec885b65c0f94e51b98b0863b8e189b620382

    • SHA256

      0be278ca113ef3c1a4a0e2d55fae91c7b5e4522412c5153d14a6eb153bcf0363

    • SHA512

      5998d25c0acfcc164f0c1cc63a4d08405550bd90b48566e3923c4936e99a3b9acd0d3728cef5588f22dc62ff69db06562e5abca42b1d64cf149c3e0192fee9a7

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks