General

  • Target

    0ab02c53191b28a3b4fe57ebdabfa8d69fa944fdc8835bef16badbad429e3178

  • Size

    176KB

  • Sample

    220212-k63ltaaea3

  • MD5

    758ecf903ddfd664d988aa47f41423b0

  • SHA1

    e9ac141abc5bad848f87d16f2d9040d5010533de

  • SHA256

    0ab02c53191b28a3b4fe57ebdabfa8d69fa944fdc8835bef16badbad429e3178

  • SHA512

    a4336fe6b251a26a8a12d55aa961297447e9e89c46867976206df220e95d03f0e2bfbbef1b86a905191aea0a30d33812cc6a9fd292a35f818f921ad1c6eb1120

Malware Config

Targets

    • Target

      0ab02c53191b28a3b4fe57ebdabfa8d69fa944fdc8835bef16badbad429e3178

    • Size

      176KB

    • MD5

      758ecf903ddfd664d988aa47f41423b0

    • SHA1

      e9ac141abc5bad848f87d16f2d9040d5010533de

    • SHA256

      0ab02c53191b28a3b4fe57ebdabfa8d69fa944fdc8835bef16badbad429e3178

    • SHA512

      a4336fe6b251a26a8a12d55aa961297447e9e89c46867976206df220e95d03f0e2bfbbef1b86a905191aea0a30d33812cc6a9fd292a35f818f921ad1c6eb1120

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks