General

  • Target

    0b09d8a713b357ed43b77ed8f5c1725a60647d1fe457b865a8d82bb08fe26545

  • Size

    99KB

  • Sample

    220212-kb2q2abfeq

  • MD5

    4a0faac441ef5c37fa02498b8575ce67

  • SHA1

    fc94e822ab312afc652fd98a32d572f0794306a1

  • SHA256

    0b09d8a713b357ed43b77ed8f5c1725a60647d1fe457b865a8d82bb08fe26545

  • SHA512

    bbbd72c50b672118476729c93584dc9f6daf9999c2849ef08bdc57c8b0a4e45d480a2c6c677924a82a98e2cb0013b0eb1f7143070c06cb2fd6a66df4794055e4

Malware Config

Targets

    • Target

      0b09d8a713b357ed43b77ed8f5c1725a60647d1fe457b865a8d82bb08fe26545

    • Size

      99KB

    • MD5

      4a0faac441ef5c37fa02498b8575ce67

    • SHA1

      fc94e822ab312afc652fd98a32d572f0794306a1

    • SHA256

      0b09d8a713b357ed43b77ed8f5c1725a60647d1fe457b865a8d82bb08fe26545

    • SHA512

      bbbd72c50b672118476729c93584dc9f6daf9999c2849ef08bdc57c8b0a4e45d480a2c6c677924a82a98e2cb0013b0eb1f7143070c06cb2fd6a66df4794055e4

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks