General

  • Target

    0804ddb0949f63423c0bba5d1eef4008c0c995354ddbc0be7b42a84a3077ba99

  • Size

    216KB

  • Sample

    220212-l6fbysbab8

  • MD5

    fb6030327e8709c598b822188f1f9766

  • SHA1

    d3da2b879bc8dc259668e497c03b7b6e6cb8a2b2

  • SHA256

    0804ddb0949f63423c0bba5d1eef4008c0c995354ddbc0be7b42a84a3077ba99

  • SHA512

    88e5ca2001462242d13ece6bafa95e15afb23b692b50ce775e3c27862127dba27643bee7f7e7355b776206ddbce6dcd3223ff3647880cf70c6a3bde5b0d42307

Malware Config

Targets

    • Target

      0804ddb0949f63423c0bba5d1eef4008c0c995354ddbc0be7b42a84a3077ba99

    • Size

      216KB

    • MD5

      fb6030327e8709c598b822188f1f9766

    • SHA1

      d3da2b879bc8dc259668e497c03b7b6e6cb8a2b2

    • SHA256

      0804ddb0949f63423c0bba5d1eef4008c0c995354ddbc0be7b42a84a3077ba99

    • SHA512

      88e5ca2001462242d13ece6bafa95e15afb23b692b50ce775e3c27862127dba27643bee7f7e7355b776206ddbce6dcd3223ff3647880cf70c6a3bde5b0d42307

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks