General

  • Target

    0abd88f76efa984c76aeeaf14de591a9656f33fed2e0236cbb0cdc3d9b695fd3

  • Size

    216KB

  • Sample

    220212-k6evraadh3

  • MD5

    ac829dd26d9d9237dee728f7b4cc5b99

  • SHA1

    5ea3ab7bc395f0f59ea577eedcd79993efe6e759

  • SHA256

    0abd88f76efa984c76aeeaf14de591a9656f33fed2e0236cbb0cdc3d9b695fd3

  • SHA512

    84167f90c74c4ebb9dc4a3dc00c6895423f3a0dea1f121ee6456615bcb4d5a2db965b35c519092e337998fc8f1b0d41eb31d7c6cbca5623c586442be67f88959

Malware Config

Targets

    • Target

      0abd88f76efa984c76aeeaf14de591a9656f33fed2e0236cbb0cdc3d9b695fd3

    • Size

      216KB

    • MD5

      ac829dd26d9d9237dee728f7b4cc5b99

    • SHA1

      5ea3ab7bc395f0f59ea577eedcd79993efe6e759

    • SHA256

      0abd88f76efa984c76aeeaf14de591a9656f33fed2e0236cbb0cdc3d9b695fd3

    • SHA512

      84167f90c74c4ebb9dc4a3dc00c6895423f3a0dea1f121ee6456615bcb4d5a2db965b35c519092e337998fc8f1b0d41eb31d7c6cbca5623c586442be67f88959

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks