General

  • Target

    0865ee96f318f0ba4017f878035a749f20770e452d51833206af155996e260fd

  • Size

    191KB

  • Sample

    220212-l18fjscefl

  • MD5

    4cc7eabd72f86e236738a2a01f2ef6e2

  • SHA1

    53f8ebcdeee88e62a2965a527d63b5430462ee23

  • SHA256

    0865ee96f318f0ba4017f878035a749f20770e452d51833206af155996e260fd

  • SHA512

    2c2cb3ff8a23d98886948a1a4837bee919789c4640c3d499b94246aace68e682a011631c828d33cad5a5ebe8e67966c34ee8dea743455ae3488dff098eecf3bf

Malware Config

Targets

    • Target

      0865ee96f318f0ba4017f878035a749f20770e452d51833206af155996e260fd

    • Size

      191KB

    • MD5

      4cc7eabd72f86e236738a2a01f2ef6e2

    • SHA1

      53f8ebcdeee88e62a2965a527d63b5430462ee23

    • SHA256

      0865ee96f318f0ba4017f878035a749f20770e452d51833206af155996e260fd

    • SHA512

      2c2cb3ff8a23d98886948a1a4837bee919789c4640c3d499b94246aace68e682a011631c828d33cad5a5ebe8e67966c34ee8dea743455ae3488dff098eecf3bf

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks