General

  • Target

    15dcf8688a05bba2c2d0be69917ca1158759d517f55e64f03bc24636b3ebf6c3

  • Size

    101KB

  • Sample

    220212-erw8lahdcr

  • MD5

    92617fadaf25a2f9a663b7a4838afd42

  • SHA1

    ece90ed7e1050f08569b6f9281919e23834cf54c

  • SHA256

    15dcf8688a05bba2c2d0be69917ca1158759d517f55e64f03bc24636b3ebf6c3

  • SHA512

    8381e09d040cc80049734d654f51cf16470ef11ad262c55415975f25d9dd7732aa40e4b39caaaaecff6c7dd92350ca56a3ab86e1c2573d9a6d7511b7b0a099c2

Malware Config

Targets

    • Target

      15dcf8688a05bba2c2d0be69917ca1158759d517f55e64f03bc24636b3ebf6c3

    • Size

      101KB

    • MD5

      92617fadaf25a2f9a663b7a4838afd42

    • SHA1

      ece90ed7e1050f08569b6f9281919e23834cf54c

    • SHA256

      15dcf8688a05bba2c2d0be69917ca1158759d517f55e64f03bc24636b3ebf6c3

    • SHA512

      8381e09d040cc80049734d654f51cf16470ef11ad262c55415975f25d9dd7732aa40e4b39caaaaecff6c7dd92350ca56a3ab86e1c2573d9a6d7511b7b0a099c2

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks