General

  • Target

    0a72b863d931cc35a67fec4a27e9e76c67cef5732617987962f7a2b94b74f170

  • Size

    36KB

  • Sample

    220212-k98x1aaed3

  • MD5

    33399a54cdf78953bac5d104edab2c9f

  • SHA1

    61eca0ea8c61f4faafcb7c13f28454fc07b316db

  • SHA256

    0a72b863d931cc35a67fec4a27e9e76c67cef5732617987962f7a2b94b74f170

  • SHA512

    c3091f8cf0e72c8ddbc1c474e822792c7527b2bfe66e25c6fae6581540265f94cfac86e14fb91e11d7fa0a343bf525e5beef4601fd8cb0999113ed7991e2e5d1

Malware Config

Targets

    • Target

      0a72b863d931cc35a67fec4a27e9e76c67cef5732617987962f7a2b94b74f170

    • Size

      36KB

    • MD5

      33399a54cdf78953bac5d104edab2c9f

    • SHA1

      61eca0ea8c61f4faafcb7c13f28454fc07b316db

    • SHA256

      0a72b863d931cc35a67fec4a27e9e76c67cef5732617987962f7a2b94b74f170

    • SHA512

      c3091f8cf0e72c8ddbc1c474e822792c7527b2bfe66e25c6fae6581540265f94cfac86e14fb91e11d7fa0a343bf525e5beef4601fd8cb0999113ed7991e2e5d1

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks