General

  • Target

    0ae9af0a495d750d6c4ddafd1161f35bda321f27a71bf5e36bd9adf6092b972a

  • Size

    36KB

  • Sample

    220212-kfkcjsbgan

  • MD5

    e5a5909a75727bf28c461768aa12f067

  • SHA1

    6678fb2e07621858bfe6c13bd24d64c597ca6e07

  • SHA256

    0ae9af0a495d750d6c4ddafd1161f35bda321f27a71bf5e36bd9adf6092b972a

  • SHA512

    b7e44e75259ab08a4fd74a20fc832f93354a765c5ff1a46afa02a6468117d6db59bb4ed1f232c46b614fc1f6a9c7d30974a542da870070d8184fc514d85b23f1

Malware Config

Targets

    • Target

      0ae9af0a495d750d6c4ddafd1161f35bda321f27a71bf5e36bd9adf6092b972a

    • Size

      36KB

    • MD5

      e5a5909a75727bf28c461768aa12f067

    • SHA1

      6678fb2e07621858bfe6c13bd24d64c597ca6e07

    • SHA256

      0ae9af0a495d750d6c4ddafd1161f35bda321f27a71bf5e36bd9adf6092b972a

    • SHA512

      b7e44e75259ab08a4fd74a20fc832f93354a765c5ff1a46afa02a6468117d6db59bb4ed1f232c46b614fc1f6a9c7d30974a542da870070d8184fc514d85b23f1

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks