General

  • Target

    0b30d70d3d315b60a7f32ba0e1b795f303cd6a41f60b98b12c22928ccbe05408

  • Size

    92KB

  • Sample

    220212-kad9caaaf6

  • MD5

    12b052bb1004b4757c0add24d03ef5ab

  • SHA1

    00a9260274281e4efe72299c22613dfbc09f7922

  • SHA256

    0b30d70d3d315b60a7f32ba0e1b795f303cd6a41f60b98b12c22928ccbe05408

  • SHA512

    0f06eaa297b88a3381c4758c00fda21f036848c0fba7966f3ce8f0e7451ca21f90702b6325fa4cdcd5bbfcb2ca0141853c6ff582c6bf06bd6632843745d3f93e

Malware Config

Targets

    • Target

      0b30d70d3d315b60a7f32ba0e1b795f303cd6a41f60b98b12c22928ccbe05408

    • Size

      92KB

    • MD5

      12b052bb1004b4757c0add24d03ef5ab

    • SHA1

      00a9260274281e4efe72299c22613dfbc09f7922

    • SHA256

      0b30d70d3d315b60a7f32ba0e1b795f303cd6a41f60b98b12c22928ccbe05408

    • SHA512

      0f06eaa297b88a3381c4758c00fda21f036848c0fba7966f3ce8f0e7451ca21f90702b6325fa4cdcd5bbfcb2ca0141853c6ff582c6bf06bd6632843745d3f93e

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks