General

  • Target

    07e989a4f73bfceeb73dd8d55b43a6351c72e664823cc3d8c24c6958a08750ac

  • Size

    79KB

  • Sample

    220212-l7r25scfdl

  • MD5

    15af3f2269a853719b25ea56adcb1db1

  • SHA1

    6ba1632180a88ff99664266cdbce5a839f7c68ad

  • SHA256

    07e989a4f73bfceeb73dd8d55b43a6351c72e664823cc3d8c24c6958a08750ac

  • SHA512

    0b3129a8ad98f3e0f641fd2a2d93115e9eaad44ecdac4963124e4247d36315851eb8e7501c939d273412dc63e3dbe5e6e079897fe49f679ac519fa41ff7e63db

Malware Config

Targets

    • Target

      07e989a4f73bfceeb73dd8d55b43a6351c72e664823cc3d8c24c6958a08750ac

    • Size

      79KB

    • MD5

      15af3f2269a853719b25ea56adcb1db1

    • SHA1

      6ba1632180a88ff99664266cdbce5a839f7c68ad

    • SHA256

      07e989a4f73bfceeb73dd8d55b43a6351c72e664823cc3d8c24c6958a08750ac

    • SHA512

      0b3129a8ad98f3e0f641fd2a2d93115e9eaad44ecdac4963124e4247d36315851eb8e7501c939d273412dc63e3dbe5e6e079897fe49f679ac519fa41ff7e63db

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks