General

  • Target

    07cc4c82781917431fa33c81fe6d5ba49553a5173b640dbad3f243eb24dc2ff0

  • Size

    99KB

  • Sample

    220212-l9rt6abae8

  • MD5

    24d135a3ab47a69bb1501ff51f51739d

  • SHA1

    2d401bc2ebb0f4275847c781cd0436b7fabcdc7c

  • SHA256

    07cc4c82781917431fa33c81fe6d5ba49553a5173b640dbad3f243eb24dc2ff0

  • SHA512

    50291613c6ae4d69bb4561e5e6ca7a9ab6ca91f84a5727dce81fc71d48f8877709796b271cacf4b50cd9457b437769997fab64660f67c3899a31f053086ace68

Malware Config

Targets

    • Target

      07cc4c82781917431fa33c81fe6d5ba49553a5173b640dbad3f243eb24dc2ff0

    • Size

      99KB

    • MD5

      24d135a3ab47a69bb1501ff51f51739d

    • SHA1

      2d401bc2ebb0f4275847c781cd0436b7fabcdc7c

    • SHA256

      07cc4c82781917431fa33c81fe6d5ba49553a5173b640dbad3f243eb24dc2ff0

    • SHA512

      50291613c6ae4d69bb4561e5e6ca7a9ab6ca91f84a5727dce81fc71d48f8877709796b271cacf4b50cd9457b437769997fab64660f67c3899a31f053086ace68

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks