General

  • Target

    0a9ed1480c3631f74ca611060bb97700d0ae00d5fe5c044df66fc45325d461e0

  • Size

    58KB

  • Sample

    220212-k7v85aaeb2

  • MD5

    6463ef18cf6c1ff4b158d5ff79e91179

  • SHA1

    3efa2054da37640af25004b546cad7c1f46ed5d4

  • SHA256

    0a9ed1480c3631f74ca611060bb97700d0ae00d5fe5c044df66fc45325d461e0

  • SHA512

    b1b1f539b3911023d7a13c1113ce4f66a9162b3a5fda61bcd1fb0fb9cb2eb4c6eb469dea529967a08ac3533e628e649fe0e8b9594753302815a364db4fad3839

Malware Config

Targets

    • Target

      0a9ed1480c3631f74ca611060bb97700d0ae00d5fe5c044df66fc45325d461e0

    • Size

      58KB

    • MD5

      6463ef18cf6c1ff4b158d5ff79e91179

    • SHA1

      3efa2054da37640af25004b546cad7c1f46ed5d4

    • SHA256

      0a9ed1480c3631f74ca611060bb97700d0ae00d5fe5c044df66fc45325d461e0

    • SHA512

      b1b1f539b3911023d7a13c1113ce4f66a9162b3a5fda61bcd1fb0fb9cb2eb4c6eb469dea529967a08ac3533e628e649fe0e8b9594753302815a364db4fad3839

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks