General

  • Target

    0aec543f25376d122c298f01ff9f624545aea63480ce829b9d966b1b3ec57dcd

  • Size

    92KB

  • Sample

    220212-kffdlaabc2

  • MD5

    069f9b64206e6dfb5d098b675dcfc585

  • SHA1

    f8979b273b1c6d9d53ffaacad481cf7206e0b2bc

  • SHA256

    0aec543f25376d122c298f01ff9f624545aea63480ce829b9d966b1b3ec57dcd

  • SHA512

    b476e795a0f263a705ade139905593519988c67dda1b270cc7fce2229dc1f66b55839cdd63c253fe919ae8a26a725141fbdf28a57edcd238b6f195a54daa9cfe

Malware Config

Targets

    • Target

      0aec543f25376d122c298f01ff9f624545aea63480ce829b9d966b1b3ec57dcd

    • Size

      92KB

    • MD5

      069f9b64206e6dfb5d098b675dcfc585

    • SHA1

      f8979b273b1c6d9d53ffaacad481cf7206e0b2bc

    • SHA256

      0aec543f25376d122c298f01ff9f624545aea63480ce829b9d966b1b3ec57dcd

    • SHA512

      b476e795a0f263a705ade139905593519988c67dda1b270cc7fce2229dc1f66b55839cdd63c253fe919ae8a26a725141fbdf28a57edcd238b6f195a54daa9cfe

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks