General

  • Target

    0bb6d88942103f3c87f5343575d070b2d49c731ed5a052312b76f258eb3d1680

  • Size

    80KB

  • Sample

    220212-jyzdrahhc9

  • MD5

    45acdb02d9de44a4e09a428cda01d653

  • SHA1

    2fc1961e3512e74fc86595cbcc8b3d10e93f4ea9

  • SHA256

    0bb6d88942103f3c87f5343575d070b2d49c731ed5a052312b76f258eb3d1680

  • SHA512

    38e87ce0e8a6f3adf03df1be4af5488ab3eca1640fd0ba35d0f9118d168f762e16c2680227870fa71dbe3cdade9cb4f88f34c8bd32b38dbaf62cfc301a3c2d7a

Malware Config

Targets

    • Target

      0bb6d88942103f3c87f5343575d070b2d49c731ed5a052312b76f258eb3d1680

    • Size

      80KB

    • MD5

      45acdb02d9de44a4e09a428cda01d653

    • SHA1

      2fc1961e3512e74fc86595cbcc8b3d10e93f4ea9

    • SHA256

      0bb6d88942103f3c87f5343575d070b2d49c731ed5a052312b76f258eb3d1680

    • SHA512

      38e87ce0e8a6f3adf03df1be4af5488ab3eca1640fd0ba35d0f9118d168f762e16c2680227870fa71dbe3cdade9cb4f88f34c8bd32b38dbaf62cfc301a3c2d7a

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks