General

  • Target

    0ad72df95e504b19920a38b964f10a715ed9e5bc5d9179b7f2a0040a5baf9d34

  • Size

    35KB

  • Sample

    220212-k3s8zaade8

  • MD5

    733a3ce23eda3b281c986b9d6cb92f25

  • SHA1

    755526034886b1c99431b169c71298131130fb02

  • SHA256

    0ad72df95e504b19920a38b964f10a715ed9e5bc5d9179b7f2a0040a5baf9d34

  • SHA512

    23d7da5ba150321bb14ca7ce48a5679d5a1993ccb49661c1b74e7c21fe5f7edfc80e522488c460606f0c3d5a2f696a2aa3074bc94875ca5fe3ff805583f501c9

Malware Config

Targets

    • Target

      0ad72df95e504b19920a38b964f10a715ed9e5bc5d9179b7f2a0040a5baf9d34

    • Size

      35KB

    • MD5

      733a3ce23eda3b281c986b9d6cb92f25

    • SHA1

      755526034886b1c99431b169c71298131130fb02

    • SHA256

      0ad72df95e504b19920a38b964f10a715ed9e5bc5d9179b7f2a0040a5baf9d34

    • SHA512

      23d7da5ba150321bb14ca7ce48a5679d5a1993ccb49661c1b74e7c21fe5f7edfc80e522488c460606f0c3d5a2f696a2aa3074bc94875ca5fe3ff805583f501c9

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks