General

  • Target

    0bab0d5af3b012cf3819353d5ce3a03d53a20c9ff4d18a18f7767a1bd1c3b8a0

  • Size

    36KB

  • Sample

    220212-jz3gssbebp

  • MD5

    5a62065234f3cc83f3a08ca135bf1398

  • SHA1

    ec5a11ecd13590a26584aae78b134aeba212cead

  • SHA256

    0bab0d5af3b012cf3819353d5ce3a03d53a20c9ff4d18a18f7767a1bd1c3b8a0

  • SHA512

    d77bf5a3fc0ca96779e87055c9b8a41d2b91cb551fa48382586f58fc2e5c7092e0bfa45e2edb029a697329fc014508fe968e9fa6af3319688a9a13f24ea72157

Malware Config

Targets

    • Target

      0bab0d5af3b012cf3819353d5ce3a03d53a20c9ff4d18a18f7767a1bd1c3b8a0

    • Size

      36KB

    • MD5

      5a62065234f3cc83f3a08ca135bf1398

    • SHA1

      ec5a11ecd13590a26584aae78b134aeba212cead

    • SHA256

      0bab0d5af3b012cf3819353d5ce3a03d53a20c9ff4d18a18f7767a1bd1c3b8a0

    • SHA512

      d77bf5a3fc0ca96779e87055c9b8a41d2b91cb551fa48382586f58fc2e5c7092e0bfa45e2edb029a697329fc014508fe968e9fa6af3319688a9a13f24ea72157

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks