General

  • Target

    0b29ab338bdfff9ba17373f4f99f5abaeef515d43d66424fa462d6f8147eb4b1

  • Size

    58KB

  • Sample

    220212-kam69abfcr

  • MD5

    190db05f58c31ff8db023c7af813051c

  • SHA1

    3bf272baaf7d4cca50fad54d38c379bc99aeffc6

  • SHA256

    0b29ab338bdfff9ba17373f4f99f5abaeef515d43d66424fa462d6f8147eb4b1

  • SHA512

    7906bef687d11e3440e0ef84bf4b6a86cd8ddf3ab00fcddf881b0b881fa1823af7ef45f7d34f94b239f68e76412cb5ad12f408a7e38c77ed6b6cfc8642a08cd9

Malware Config

Targets

    • Target

      0b29ab338bdfff9ba17373f4f99f5abaeef515d43d66424fa462d6f8147eb4b1

    • Size

      58KB

    • MD5

      190db05f58c31ff8db023c7af813051c

    • SHA1

      3bf272baaf7d4cca50fad54d38c379bc99aeffc6

    • SHA256

      0b29ab338bdfff9ba17373f4f99f5abaeef515d43d66424fa462d6f8147eb4b1

    • SHA512

      7906bef687d11e3440e0ef84bf4b6a86cd8ddf3ab00fcddf881b0b881fa1823af7ef45f7d34f94b239f68e76412cb5ad12f408a7e38c77ed6b6cfc8642a08cd9

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks