General

  • Target

    0bac345e64eaed77c319a3fd704da48c4c18506c6f29ce7650b37df24da05d27

  • Size

    36KB

  • Sample

    220212-jzwdgsbebn

  • MD5

    ae5774b0da58385f81bf4a4c28a078b1

  • SHA1

    f34592150845f5cf9f88061734ac7ad2c11a6852

  • SHA256

    0bac345e64eaed77c319a3fd704da48c4c18506c6f29ce7650b37df24da05d27

  • SHA512

    ba74472891a35828e13472f61347036f245f9d23892e36ca94e5939eac7250c6eabd8bb37d995454c4e45dec244df9e32d8786542538081989dfad3577d61adb

Malware Config

Targets

    • Target

      0bac345e64eaed77c319a3fd704da48c4c18506c6f29ce7650b37df24da05d27

    • Size

      36KB

    • MD5

      ae5774b0da58385f81bf4a4c28a078b1

    • SHA1

      f34592150845f5cf9f88061734ac7ad2c11a6852

    • SHA256

      0bac345e64eaed77c319a3fd704da48c4c18506c6f29ce7650b37df24da05d27

    • SHA512

      ba74472891a35828e13472f61347036f245f9d23892e36ca94e5939eac7250c6eabd8bb37d995454c4e45dec244df9e32d8786542538081989dfad3577d61adb

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks