General

  • Target

    087668bbb3536f40f6221a1caa4dfd39703753c313aef83abe9d4e9bf2edbb6d

  • Size

    191KB

  • Sample

    220212-l1dwyaahd7

  • MD5

    e56bd7c7b50e1926fc006de7a55656f6

  • SHA1

    3d4ed0897cc06b395193c9645bddc522337ed701

  • SHA256

    087668bbb3536f40f6221a1caa4dfd39703753c313aef83abe9d4e9bf2edbb6d

  • SHA512

    fb171b8e0fba763186dd74944ab8284107b258b855a340cc50f5f205b5cbc6731ce8349dea98a78c57cf7006b2decbb19d25818477fe5e4ee829fb7a2e4c8982

Malware Config

Targets

    • Target

      087668bbb3536f40f6221a1caa4dfd39703753c313aef83abe9d4e9bf2edbb6d

    • Size

      191KB

    • MD5

      e56bd7c7b50e1926fc006de7a55656f6

    • SHA1

      3d4ed0897cc06b395193c9645bddc522337ed701

    • SHA256

      087668bbb3536f40f6221a1caa4dfd39703753c313aef83abe9d4e9bf2edbb6d

    • SHA512

      fb171b8e0fba763186dd74944ab8284107b258b855a340cc50f5f205b5cbc6731ce8349dea98a78c57cf7006b2decbb19d25818477fe5e4ee829fb7a2e4c8982

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks