General

  • Target

    0bad9c0af6f1d508f4c238ff753434089b9e73fb1f913d775c7f609afd75458b

  • Size

    58KB

  • Sample

    220212-jzrqasbebl

  • MD5

    50560ff18bdbc2fbeb9a35ebedba76c3

  • SHA1

    6297da7860019cfca492456a88084180f5c54d25

  • SHA256

    0bad9c0af6f1d508f4c238ff753434089b9e73fb1f913d775c7f609afd75458b

  • SHA512

    b7a179eb21e5a46684182b865507575efdcc24677439b5d4e730dadf51be6d804825b02e00548c945ab16812edb695ad0a8ddef0f96c42c9a14d1563efd65510

Malware Config

Targets

    • Target

      0bad9c0af6f1d508f4c238ff753434089b9e73fb1f913d775c7f609afd75458b

    • Size

      58KB

    • MD5

      50560ff18bdbc2fbeb9a35ebedba76c3

    • SHA1

      6297da7860019cfca492456a88084180f5c54d25

    • SHA256

      0bad9c0af6f1d508f4c238ff753434089b9e73fb1f913d775c7f609afd75458b

    • SHA512

      b7a179eb21e5a46684182b865507575efdcc24677439b5d4e730dadf51be6d804825b02e00548c945ab16812edb695ad0a8ddef0f96c42c9a14d1563efd65510

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks