General

  • Target

    0bda8039c3bf2f357bbda24ec2a148f1fa08377aac28d1f9a7e327d0c3c06ba7

  • Size

    80KB

  • Sample

    220212-jxggjshhb4

  • MD5

    697e44ed9131b546896f86682ea70b00

  • SHA1

    32aceccd87b4e30cd636f9f4baee5b0c32702f4e

  • SHA256

    0bda8039c3bf2f357bbda24ec2a148f1fa08377aac28d1f9a7e327d0c3c06ba7

  • SHA512

    f7b486ca9eee8438553ee5878987cd06ad6d59fd3874c3b91abc2fe79f7f1413c3071abda2a0953adbbd12cb2e319fa89c32893672dbe6971cc4cbab2d3ff912

Malware Config

Targets

    • Target

      0bda8039c3bf2f357bbda24ec2a148f1fa08377aac28d1f9a7e327d0c3c06ba7

    • Size

      80KB

    • MD5

      697e44ed9131b546896f86682ea70b00

    • SHA1

      32aceccd87b4e30cd636f9f4baee5b0c32702f4e

    • SHA256

      0bda8039c3bf2f357bbda24ec2a148f1fa08377aac28d1f9a7e327d0c3c06ba7

    • SHA512

      f7b486ca9eee8438553ee5878987cd06ad6d59fd3874c3b91abc2fe79f7f1413c3071abda2a0953adbbd12cb2e319fa89c32893672dbe6971cc4cbab2d3ff912

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks