General

  • Target

    0af623900a19320bce85c4bca0f946be63cb5d21d119004d44613b3d32b08d18

  • Size

    101KB

  • Sample

    220212-keka6abfhn

  • MD5

    29b7071e4d7d0bed63b622b3665a8d56

  • SHA1

    23315af8e6e3269ca10fbf12154614b15184477a

  • SHA256

    0af623900a19320bce85c4bca0f946be63cb5d21d119004d44613b3d32b08d18

  • SHA512

    fc47cd9d4d399145a993662a068b2bb7762006c1eabe221fca30c1350b1a149b32f3c714a150706e80a797826b3c1a00ab68170e53433387c27084f67d8ac894

Malware Config

Targets

    • Target

      0af623900a19320bce85c4bca0f946be63cb5d21d119004d44613b3d32b08d18

    • Size

      101KB

    • MD5

      29b7071e4d7d0bed63b622b3665a8d56

    • SHA1

      23315af8e6e3269ca10fbf12154614b15184477a

    • SHA256

      0af623900a19320bce85c4bca0f946be63cb5d21d119004d44613b3d32b08d18

    • SHA512

      fc47cd9d4d399145a993662a068b2bb7762006c1eabe221fca30c1350b1a149b32f3c714a150706e80a797826b3c1a00ab68170e53433387c27084f67d8ac894

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks