General

  • Target

    0a89457bbd3e7321c2b9e2890099397d06e14086a9b586e26d0ba8924754eb71

  • Size

    101KB

  • Sample

    220212-k8793saec6

  • MD5

    ff08bd7d52bae2f55f8e8ab90b6f3e6f

  • SHA1

    242faa45f3956f771612723f78708f9c63018025

  • SHA256

    0a89457bbd3e7321c2b9e2890099397d06e14086a9b586e26d0ba8924754eb71

  • SHA512

    179cbbbc84d377a43726f6362e19e5175ad3c04cb7d98886d0f73155eced3bd9f38495d7c0deb148e975d2944ca286b5b601dfb4f0b1f59990b21ef69a40436e

Malware Config

Targets

    • Target

      0a89457bbd3e7321c2b9e2890099397d06e14086a9b586e26d0ba8924754eb71

    • Size

      101KB

    • MD5

      ff08bd7d52bae2f55f8e8ab90b6f3e6f

    • SHA1

      242faa45f3956f771612723f78708f9c63018025

    • SHA256

      0a89457bbd3e7321c2b9e2890099397d06e14086a9b586e26d0ba8924754eb71

    • SHA512

      179cbbbc84d377a43726f6362e19e5175ad3c04cb7d98886d0f73155eced3bd9f38495d7c0deb148e975d2944ca286b5b601dfb4f0b1f59990b21ef69a40436e

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks