General

  • Target

    0a7810bdce1fb4be0f5e28e2163fdd301d0e6750c14979f5c58ac2d8ecc5ea31

  • Size

    60KB

  • Sample

    220212-k9zz4acbcq

  • MD5

    e4b5e7afe9157a0cd2e05df6531458b3

  • SHA1

    748bc066eb71c42e6038f00c4779a52805833f80

  • SHA256

    0a7810bdce1fb4be0f5e28e2163fdd301d0e6750c14979f5c58ac2d8ecc5ea31

  • SHA512

    0d19977701bab6eaadd7a7304801628d50050dbccfccca891ae6c0b41f979c4e228de25db7df62c6d946a043e3ccfe2e517eecd9fc09cd14366a96791dd708ec

Malware Config

Targets

    • Target

      0a7810bdce1fb4be0f5e28e2163fdd301d0e6750c14979f5c58ac2d8ecc5ea31

    • Size

      60KB

    • MD5

      e4b5e7afe9157a0cd2e05df6531458b3

    • SHA1

      748bc066eb71c42e6038f00c4779a52805833f80

    • SHA256

      0a7810bdce1fb4be0f5e28e2163fdd301d0e6750c14979f5c58ac2d8ecc5ea31

    • SHA512

      0d19977701bab6eaadd7a7304801628d50050dbccfccca891ae6c0b41f979c4e228de25db7df62c6d946a043e3ccfe2e517eecd9fc09cd14366a96791dd708ec

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks