General

  • Target

    0bb44b3554d887079c978b8135e867dbd8f586d57daa5aa0a6be45792cdfb78d

  • Size

    216KB

  • Sample

    220212-jy4ngahhd3

  • MD5

    294d8175c71c6e2b5adf407251686b51

  • SHA1

    58ed40421f8c41e6a6ce84642e7436e5669cd9dd

  • SHA256

    0bb44b3554d887079c978b8135e867dbd8f586d57daa5aa0a6be45792cdfb78d

  • SHA512

    cd17fb4362723578684866fc5bd13378faa44c79f1fe5e4c86db1deef3774fe8bb8a4d9bc6fad4f4f0b9a1127f0e1c8564bcf07a1d333365b6a6bb14fe263f7a

Malware Config

Targets

    • Target

      0bb44b3554d887079c978b8135e867dbd8f586d57daa5aa0a6be45792cdfb78d

    • Size

      216KB

    • MD5

      294d8175c71c6e2b5adf407251686b51

    • SHA1

      58ed40421f8c41e6a6ce84642e7436e5669cd9dd

    • SHA256

      0bb44b3554d887079c978b8135e867dbd8f586d57daa5aa0a6be45792cdfb78d

    • SHA512

      cd17fb4362723578684866fc5bd13378faa44c79f1fe5e4c86db1deef3774fe8bb8a4d9bc6fad4f4f0b9a1127f0e1c8564bcf07a1d333365b6a6bb14fe263f7a

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks