General

  • Target

    0af2249207403647a8635058cc7340379257e94a1a111fbdaed17a7bb547e2c9

  • Size

    101KB

  • Sample

    220212-ke19nsbgaj

  • MD5

    be36dab106c8d5da527d12cdf1868192

  • SHA1

    ef5be3b0d1327662e186b0f847ccd23ccee5728b

  • SHA256

    0af2249207403647a8635058cc7340379257e94a1a111fbdaed17a7bb547e2c9

  • SHA512

    1d0ba0365518c373c9f2a969e4ada04c8870e79a651cf7efea21bb6830bec74bc0308e5a56df72c55e7f4bc5f1f32dd5689ec3b0023a3753d88a9dbb8e929569

Malware Config

Targets

    • Target

      0af2249207403647a8635058cc7340379257e94a1a111fbdaed17a7bb547e2c9

    • Size

      101KB

    • MD5

      be36dab106c8d5da527d12cdf1868192

    • SHA1

      ef5be3b0d1327662e186b0f847ccd23ccee5728b

    • SHA256

      0af2249207403647a8635058cc7340379257e94a1a111fbdaed17a7bb547e2c9

    • SHA512

      1d0ba0365518c373c9f2a969e4ada04c8870e79a651cf7efea21bb6830bec74bc0308e5a56df72c55e7f4bc5f1f32dd5689ec3b0023a3753d88a9dbb8e929569

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks