General

  • Target

    0ad573f7b208ddcd0936c37458ac00237b00bb3e35197ee72308b25c70b7a287

  • Size

    99KB

  • Sample

    220212-k4lwaacaer

  • MD5

    0b5506363176f153bb5d76d57e57c848

  • SHA1

    5e1f0c5df4e59b9608173e0093d4f44ad9f97ae4

  • SHA256

    0ad573f7b208ddcd0936c37458ac00237b00bb3e35197ee72308b25c70b7a287

  • SHA512

    6724a36ae24071506e72caa79201acdac5ac687a9b2425dafaf60afbf2bb4dc33176c4e4f47bce350a898a0d10f0aea9461b759d4832add8c88c62951084c927

Malware Config

Targets

    • Target

      0ad573f7b208ddcd0936c37458ac00237b00bb3e35197ee72308b25c70b7a287

    • Size

      99KB

    • MD5

      0b5506363176f153bb5d76d57e57c848

    • SHA1

      5e1f0c5df4e59b9608173e0093d4f44ad9f97ae4

    • SHA256

      0ad573f7b208ddcd0936c37458ac00237b00bb3e35197ee72308b25c70b7a287

    • SHA512

      6724a36ae24071506e72caa79201acdac5ac687a9b2425dafaf60afbf2bb4dc33176c4e4f47bce350a898a0d10f0aea9461b759d4832add8c88c62951084c927

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks