General

  • Target

    07dce49af59727bdde1e1830cc6469dfdf17034b356b451cc49d77912ff0927b

  • Size

    101KB

  • Sample

    220212-l8cnvacfdr

  • MD5

    95b1f0096a1dd1080d2c169a23f04e5a

  • SHA1

    c421acfe5dc3da6fe6c3ada66540cb1c768f5ad4

  • SHA256

    07dce49af59727bdde1e1830cc6469dfdf17034b356b451cc49d77912ff0927b

  • SHA512

    2cacf5e0f9e8060a7f0db85b6c1fc3453b21f7fc725bcc8429565ab1f01564a64ad447b9a2890c3e71af58d14ea7c44914ebef71b9b57cb3a3973b723e51ad04

Malware Config

Targets

    • Target

      07dce49af59727bdde1e1830cc6469dfdf17034b356b451cc49d77912ff0927b

    • Size

      101KB

    • MD5

      95b1f0096a1dd1080d2c169a23f04e5a

    • SHA1

      c421acfe5dc3da6fe6c3ada66540cb1c768f5ad4

    • SHA256

      07dce49af59727bdde1e1830cc6469dfdf17034b356b451cc49d77912ff0927b

    • SHA512

      2cacf5e0f9e8060a7f0db85b6c1fc3453b21f7fc725bcc8429565ab1f01564a64ad447b9a2890c3e71af58d14ea7c44914ebef71b9b57cb3a3973b723e51ad04

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks