General

  • Target

    0bbd47ad45a2cd9e4aec7b862b00622086187d81b73a700d276a61bfffd321d3

  • Size

    192KB

  • Sample

    220212-jyqfvahhc6

  • MD5

    014bcca0aecb2cb7a9c4d022f5125e4a

  • SHA1

    720752870227ca4a8512e3be85ef714e25a7dde8

  • SHA256

    0bbd47ad45a2cd9e4aec7b862b00622086187d81b73a700d276a61bfffd321d3

  • SHA512

    f2c29e195ccd64d73c8721f1ac9b342be8ad747d4ebe90fda449b12ecddf1e904cfd9f3546789091b62bd0aac32bc2a236877083f22d0e672aa50b313e15d40c

Malware Config

Targets

    • Target

      0bbd47ad45a2cd9e4aec7b862b00622086187d81b73a700d276a61bfffd321d3

    • Size

      192KB

    • MD5

      014bcca0aecb2cb7a9c4d022f5125e4a

    • SHA1

      720752870227ca4a8512e3be85ef714e25a7dde8

    • SHA256

      0bbd47ad45a2cd9e4aec7b862b00622086187d81b73a700d276a61bfffd321d3

    • SHA512

      f2c29e195ccd64d73c8721f1ac9b342be8ad747d4ebe90fda449b12ecddf1e904cfd9f3546789091b62bd0aac32bc2a236877083f22d0e672aa50b313e15d40c

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks