General

  • Target

    0af3a1ce0ec970a4e80538e9495dbde45ae66b6d3380c39f1ffa7fd550cabc42

  • Size

    35KB

  • Sample

    220212-ket6csabb6

  • MD5

    8cfbf4099d1cc9f430fcf6ad781fd80d

  • SHA1

    d5d41e2b7218c496d87ed6ba145a3d0b2764de91

  • SHA256

    0af3a1ce0ec970a4e80538e9495dbde45ae66b6d3380c39f1ffa7fd550cabc42

  • SHA512

    0dfe673ad869a2927402ffda19b9c65d0e1de9a36f524f9119972789b5c6f81713c0d207ecb846c5ebf9578a78ab114e0df1cfacc6a0ea4375b5707fc8cfbad8

Malware Config

Targets

    • Target

      0af3a1ce0ec970a4e80538e9495dbde45ae66b6d3380c39f1ffa7fd550cabc42

    • Size

      35KB

    • MD5

      8cfbf4099d1cc9f430fcf6ad781fd80d

    • SHA1

      d5d41e2b7218c496d87ed6ba145a3d0b2764de91

    • SHA256

      0af3a1ce0ec970a4e80538e9495dbde45ae66b6d3380c39f1ffa7fd550cabc42

    • SHA512

      0dfe673ad869a2927402ffda19b9c65d0e1de9a36f524f9119972789b5c6f81713c0d207ecb846c5ebf9578a78ab114e0df1cfacc6a0ea4375b5707fc8cfbad8

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks