General

  • Target

    0860a6435aacfd478a4444fbf20b70ba537bcd1501efc5749664c6b6a2fe09a2

  • Size

    192KB

  • Sample

    220212-l2nsjacefr

  • MD5

    e0899d843ccb294446d222ab179e4f6a

  • SHA1

    9bd29a1d361414538f245d8c9aeb8b271431c901

  • SHA256

    0860a6435aacfd478a4444fbf20b70ba537bcd1501efc5749664c6b6a2fe09a2

  • SHA512

    06b10f8d2d587f80b58005611b9dfe6cd9fb6c6ecc22190ea7cea57d6f0095015c970da7c1338b8953831d1b4f38ddd672e9db10bf22e541112bd26eb75975bc

Malware Config

Targets

    • Target

      0860a6435aacfd478a4444fbf20b70ba537bcd1501efc5749664c6b6a2fe09a2

    • Size

      192KB

    • MD5

      e0899d843ccb294446d222ab179e4f6a

    • SHA1

      9bd29a1d361414538f245d8c9aeb8b271431c901

    • SHA256

      0860a6435aacfd478a4444fbf20b70ba537bcd1501efc5749664c6b6a2fe09a2

    • SHA512

      06b10f8d2d587f80b58005611b9dfe6cd9fb6c6ecc22190ea7cea57d6f0095015c970da7c1338b8953831d1b4f38ddd672e9db10bf22e541112bd26eb75975bc

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks