General

  • Target

    0b188382593af6f19835504390336f2e6d0eef62b9e3be531e23077dbf301196

  • Size

    116KB

  • Sample

    220212-kbb6daaag3

  • MD5

    d801572fd3337510c1d3b22984c90c26

  • SHA1

    97b78db5c6e6d80dc397b57eca5726b021ea13d5

  • SHA256

    0b188382593af6f19835504390336f2e6d0eef62b9e3be531e23077dbf301196

  • SHA512

    28b4adcb4735dfaca6dd5180fc81a6ddc060edd4017991a8ad1e5a2112c0b0126254079f5c1f737024b8781380e26ec81f1e168a3766d310d23d3a71d0c4424c

Malware Config

Targets

    • Target

      0b188382593af6f19835504390336f2e6d0eef62b9e3be531e23077dbf301196

    • Size

      116KB

    • MD5

      d801572fd3337510c1d3b22984c90c26

    • SHA1

      97b78db5c6e6d80dc397b57eca5726b021ea13d5

    • SHA256

      0b188382593af6f19835504390336f2e6d0eef62b9e3be531e23077dbf301196

    • SHA512

      28b4adcb4735dfaca6dd5180fc81a6ddc060edd4017991a8ad1e5a2112c0b0126254079f5c1f737024b8781380e26ec81f1e168a3766d310d23d3a71d0c4424c

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks