General

  • Target

    0801b55ef0e87dafe962410122538d1133941949095c64839278be11e5150203

  • Size

    36KB

  • Sample

    220212-l6kaxabac2

  • MD5

    2ab62d4ee9cc0d442f9dc73a2471bc81

  • SHA1

    19808d5626693f44f4bf049ecf1cf2cafdee3cc8

  • SHA256

    0801b55ef0e87dafe962410122538d1133941949095c64839278be11e5150203

  • SHA512

    11a37c052abecb741a253fc75e2006160307b388c8b15da1476615000c29de214a7845b72b7618d9abb63865163a4dccd403726b0b7ae03dcfdb4198ff3accce

Malware Config

Targets

    • Target

      0801b55ef0e87dafe962410122538d1133941949095c64839278be11e5150203

    • Size

      36KB

    • MD5

      2ab62d4ee9cc0d442f9dc73a2471bc81

    • SHA1

      19808d5626693f44f4bf049ecf1cf2cafdee3cc8

    • SHA256

      0801b55ef0e87dafe962410122538d1133941949095c64839278be11e5150203

    • SHA512

      11a37c052abecb741a253fc75e2006160307b388c8b15da1476615000c29de214a7845b72b7618d9abb63865163a4dccd403726b0b7ae03dcfdb4198ff3accce

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks