General

  • Target

    0814679b625f44541434844847bee7fad20732dc21768ae3574373c59813e1f1

  • Size

    80KB

  • Sample

    220212-l5jb8abaa7

  • MD5

    4765f53bcb3b7d548c4d2eac86bc73ce

  • SHA1

    341752112c8c6530fa47c3cb7a8ad96b81d76939

  • SHA256

    0814679b625f44541434844847bee7fad20732dc21768ae3574373c59813e1f1

  • SHA512

    8596b7a3363cf1441beacde81609c90478f4f652677d5a18fe172de9210526a4b42b6c68a6e5459d95192b81c2831d5a041e36fa57ee02da6c1662b3a38b9d98

Malware Config

Targets

    • Target

      0814679b625f44541434844847bee7fad20732dc21768ae3574373c59813e1f1

    • Size

      80KB

    • MD5

      4765f53bcb3b7d548c4d2eac86bc73ce

    • SHA1

      341752112c8c6530fa47c3cb7a8ad96b81d76939

    • SHA256

      0814679b625f44541434844847bee7fad20732dc21768ae3574373c59813e1f1

    • SHA512

      8596b7a3363cf1441beacde81609c90478f4f652677d5a18fe172de9210526a4b42b6c68a6e5459d95192b81c2831d5a041e36fa57ee02da6c1662b3a38b9d98

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks