General

  • Target

    0a866b9011b377be7330f09a6d312f1309184a22b65d906abd1a3a53056a77a9

  • Size

    192KB

  • Sample

    220212-k9en6acbck

  • MD5

    b11583c4823bedb08210924694ad228d

  • SHA1

    929577ca9844ca93a7ce846bca472028085a01bd

  • SHA256

    0a866b9011b377be7330f09a6d312f1309184a22b65d906abd1a3a53056a77a9

  • SHA512

    d50554dd814be591de978c52b5671f32c5979b024fdeafc894ecd7c0550556dc467007730cd74c65fd8bcdbdcdcca0a5350b3a3339886a6e71929b20ce707888

Malware Config

Targets

    • Target

      0a866b9011b377be7330f09a6d312f1309184a22b65d906abd1a3a53056a77a9

    • Size

      192KB

    • MD5

      b11583c4823bedb08210924694ad228d

    • SHA1

      929577ca9844ca93a7ce846bca472028085a01bd

    • SHA256

      0a866b9011b377be7330f09a6d312f1309184a22b65d906abd1a3a53056a77a9

    • SHA512

      d50554dd814be591de978c52b5671f32c5979b024fdeafc894ecd7c0550556dc467007730cd74c65fd8bcdbdcdcca0a5350b3a3339886a6e71929b20ce707888

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks