General

  • Target

    07ed11eac5c5ebba8b1fa53e07ef55dc34b937469f790eb028a13460857588b2

  • Size

    99KB

  • Sample

    220212-l7d6aabac7

  • MD5

    0d4ad1f926790fc99eb603f57c558f73

  • SHA1

    6bb8a43714c1870cbb97d9205441eb09826d3f76

  • SHA256

    07ed11eac5c5ebba8b1fa53e07ef55dc34b937469f790eb028a13460857588b2

  • SHA512

    af30f6c7a83d05a3405fb2eb5c1370a2f6ba8f6c922d2dd6cdde4fd31de49039fd892edf08771fd54cfb7bf43faf6039d027c9151c292e8b11642e690dd98aae

Malware Config

Targets

    • Target

      07ed11eac5c5ebba8b1fa53e07ef55dc34b937469f790eb028a13460857588b2

    • Size

      99KB

    • MD5

      0d4ad1f926790fc99eb603f57c558f73

    • SHA1

      6bb8a43714c1870cbb97d9205441eb09826d3f76

    • SHA256

      07ed11eac5c5ebba8b1fa53e07ef55dc34b937469f790eb028a13460857588b2

    • SHA512

      af30f6c7a83d05a3405fb2eb5c1370a2f6ba8f6c922d2dd6cdde4fd31de49039fd892edf08771fd54cfb7bf43faf6039d027c9151c292e8b11642e690dd98aae

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks