General

  • Target

    0ba5b4bb7ed6a01510af9d778de548f824bc90c46d35ac12a46971f7120fe784

  • Size

    99KB

  • Sample

    220212-jz9k4sbebr

  • MD5

    1fba1dff04a1992d1d236f7af5e73692

  • SHA1

    a3c6d2897745f39ec17fd28f375d6d93dcdaceaa

  • SHA256

    0ba5b4bb7ed6a01510af9d778de548f824bc90c46d35ac12a46971f7120fe784

  • SHA512

    2ddc387d4f1a6c2574ad4de08017f2109c8f859c0cba6f676d44bea659b41a6b98b1462b17cab132ce4f3bede6324b416a7dc393a6cba3d4550abdc545f02104

Malware Config

Targets

    • Target

      0ba5b4bb7ed6a01510af9d778de548f824bc90c46d35ac12a46971f7120fe784

    • Size

      99KB

    • MD5

      1fba1dff04a1992d1d236f7af5e73692

    • SHA1

      a3c6d2897745f39ec17fd28f375d6d93dcdaceaa

    • SHA256

      0ba5b4bb7ed6a01510af9d778de548f824bc90c46d35ac12a46971f7120fe784

    • SHA512

      2ddc387d4f1a6c2574ad4de08017f2109c8f859c0cba6f676d44bea659b41a6b98b1462b17cab132ce4f3bede6324b416a7dc393a6cba3d4550abdc545f02104

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks