General

  • Target

    0af3b4ce2990b52f5d67e9883304fc0829287a0e7b56b80f9f2a7a2870e7899e

  • Size

    36KB

  • Sample

    220212-kesbrsbfhp

  • MD5

    9354cd39921ac4f3abe2d38fec9e05c7

  • SHA1

    ee5e5cc2ce81b2f871a1ded1793513d2538052e4

  • SHA256

    0af3b4ce2990b52f5d67e9883304fc0829287a0e7b56b80f9f2a7a2870e7899e

  • SHA512

    7b4800feeb234715032425dec4f071214be8bd38b761ea7699c4a6165a8536922c3b353ffaa66a0d2e014034dae1fe504abc61456da5f2f618135a3f9181c7d7

Malware Config

Targets

    • Target

      0af3b4ce2990b52f5d67e9883304fc0829287a0e7b56b80f9f2a7a2870e7899e

    • Size

      36KB

    • MD5

      9354cd39921ac4f3abe2d38fec9e05c7

    • SHA1

      ee5e5cc2ce81b2f871a1ded1793513d2538052e4

    • SHA256

      0af3b4ce2990b52f5d67e9883304fc0829287a0e7b56b80f9f2a7a2870e7899e

    • SHA512

      7b4800feeb234715032425dec4f071214be8bd38b761ea7699c4a6165a8536922c3b353ffaa66a0d2e014034dae1fe504abc61456da5f2f618135a3f9181c7d7

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks