General

  • Target

    08171590608cd6cdd31a80dfe3005e72c40fd3836372c18f493df4ab24c0a814

  • Size

    80KB

  • Sample

    220212-l5ec9scfan

  • MD5

    ae72192dfededc4fd7a198bce466356c

  • SHA1

    7ab4b5816818415a7070c219790a9343e25ee02c

  • SHA256

    08171590608cd6cdd31a80dfe3005e72c40fd3836372c18f493df4ab24c0a814

  • SHA512

    0b3d0f23be8aaf4deb44e10ebd909565360b80b1d5a3eb6813b42f09b7b78eae02cd7bb380937f8562e50f87c5f8f740594a86001ca3b09d3f6b43e171e8574e

Malware Config

Targets

    • Target

      08171590608cd6cdd31a80dfe3005e72c40fd3836372c18f493df4ab24c0a814

    • Size

      80KB

    • MD5

      ae72192dfededc4fd7a198bce466356c

    • SHA1

      7ab4b5816818415a7070c219790a9343e25ee02c

    • SHA256

      08171590608cd6cdd31a80dfe3005e72c40fd3836372c18f493df4ab24c0a814

    • SHA512

      0b3d0f23be8aaf4deb44e10ebd909565360b80b1d5a3eb6813b42f09b7b78eae02cd7bb380937f8562e50f87c5f8f740594a86001ca3b09d3f6b43e171e8574e

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks