General

  • Target

    081255c12937cb41f92d1631d893470b19f687704377fb3ecb95eb68e08eaf5c

  • Size

    101KB

  • Sample

    220212-l5qrasbaa9

  • MD5

    328952feb4f9da02ff3e48881be10d75

  • SHA1

    481150a67415c2ffc587f353c338a264a2f23bfb

  • SHA256

    081255c12937cb41f92d1631d893470b19f687704377fb3ecb95eb68e08eaf5c

  • SHA512

    c605e69c7a423104b4ecf1e57e2b4040a716c49ee2805d18a20b1903d4306fee02c9afff5e88cd59bb0f5bdab55b5c5bb2393b25a8188423efbba0951432c147

Malware Config

Targets

    • Target

      081255c12937cb41f92d1631d893470b19f687704377fb3ecb95eb68e08eaf5c

    • Size

      101KB

    • MD5

      328952feb4f9da02ff3e48881be10d75

    • SHA1

      481150a67415c2ffc587f353c338a264a2f23bfb

    • SHA256

      081255c12937cb41f92d1631d893470b19f687704377fb3ecb95eb68e08eaf5c

    • SHA512

      c605e69c7a423104b4ecf1e57e2b4040a716c49ee2805d18a20b1903d4306fee02c9afff5e88cd59bb0f5bdab55b5c5bb2393b25a8188423efbba0951432c147

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks