General

  • Target

    0871b20669a4cf675543101d7dcd4c7b64c08ffbd1602aada17856cdb6df8142

  • Size

    92KB

  • Sample

    220212-l1vjpaahe5

  • MD5

    d6078cacd8e3d8e1d3eec4e0041eb931

  • SHA1

    628abdc382c30217ffbf451cae03cc834164627d

  • SHA256

    0871b20669a4cf675543101d7dcd4c7b64c08ffbd1602aada17856cdb6df8142

  • SHA512

    fde2d6e19e12c373b70e8fb14806c484c67ec14427cc5f68875ab03aba836bf2aef0ba01c621ec49decbcd2ce465bee2fc4663e4582d2e71fcd55302263a78bf

Malware Config

Targets

    • Target

      0871b20669a4cf675543101d7dcd4c7b64c08ffbd1602aada17856cdb6df8142

    • Size

      92KB

    • MD5

      d6078cacd8e3d8e1d3eec4e0041eb931

    • SHA1

      628abdc382c30217ffbf451cae03cc834164627d

    • SHA256

      0871b20669a4cf675543101d7dcd4c7b64c08ffbd1602aada17856cdb6df8142

    • SHA512

      fde2d6e19e12c373b70e8fb14806c484c67ec14427cc5f68875ab03aba836bf2aef0ba01c621ec49decbcd2ce465bee2fc4663e4582d2e71fcd55302263a78bf

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks