General

  • Target

    0a8c9522cc456b70144f5c912aa6aef5bdc93054e94af4c74e4775318c7248a7

  • Size

    99KB

  • Sample

    220212-k8r8vscbbl

  • MD5

    06e29477ad6a08d8ce82eeaeccc1b1c2

  • SHA1

    58f8cf45db82781295bedea437215f26e1420b3e

  • SHA256

    0a8c9522cc456b70144f5c912aa6aef5bdc93054e94af4c74e4775318c7248a7

  • SHA512

    15fce6680c59efe9d4c083232e86b3514cbbbf699e4189feb082e356ef33f2b7808975370b2720f9cc242f638b774fca2531d8b94934a7120c223522e7dff357

Malware Config

Targets

    • Target

      0a8c9522cc456b70144f5c912aa6aef5bdc93054e94af4c74e4775318c7248a7

    • Size

      99KB

    • MD5

      06e29477ad6a08d8ce82eeaeccc1b1c2

    • SHA1

      58f8cf45db82781295bedea437215f26e1420b3e

    • SHA256

      0a8c9522cc456b70144f5c912aa6aef5bdc93054e94af4c74e4775318c7248a7

    • SHA512

      15fce6680c59efe9d4c083232e86b3514cbbbf699e4189feb082e356ef33f2b7808975370b2720f9cc242f638b774fca2531d8b94934a7120c223522e7dff357

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks