General

  • Target

    0710b6b9d03b25b32badd3b214d195e1780254e50b05e537194e506364da684a

  • Size

    192KB

  • Sample

    220212-mjdehschbl

  • MD5

    1ba1c919a3dec5e12213a22d225d6d81

  • SHA1

    9d37995f35fa24e868ac863399e06dc5dc7f98d0

  • SHA256

    0710b6b9d03b25b32badd3b214d195e1780254e50b05e537194e506364da684a

  • SHA512

    629a23d013473cc89bd0a677f73a9eed36684ec8787a1a9474d7a96985df7820bf73cfe7eb839d881a638a5a48e161ba7c604bdd0e5aea0861af2da98a7972df

Malware Config

Targets

    • Target

      0710b6b9d03b25b32badd3b214d195e1780254e50b05e537194e506364da684a

    • Size

      192KB

    • MD5

      1ba1c919a3dec5e12213a22d225d6d81

    • SHA1

      9d37995f35fa24e868ac863399e06dc5dc7f98d0

    • SHA256

      0710b6b9d03b25b32badd3b214d195e1780254e50b05e537194e506364da684a

    • SHA512

      629a23d013473cc89bd0a677f73a9eed36684ec8787a1a9474d7a96985df7820bf73cfe7eb839d881a638a5a48e161ba7c604bdd0e5aea0861af2da98a7972df

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks