General

  • Target

    0a567390517cbee3936871bbfe02a6f9d572085c434d1a5ae0ceaa4e619fe12b

  • Size

    101KB

  • Sample

    220212-la97fsaed7

  • MD5

    6ad8912308f3613cf6f90fa6bcfd8b4c

  • SHA1

    3f000d62e5265a2bc0d053db0426d608f9327320

  • SHA256

    0a567390517cbee3936871bbfe02a6f9d572085c434d1a5ae0ceaa4e619fe12b

  • SHA512

    df96f93b22f7129c913445c5f0946d1513c7c2690d0a48d9099921661e113faf34cc551c6cab2a8da1087279bef128e29e56142627da634811a44aa44ad0e025

Malware Config

Targets

    • Target

      0a567390517cbee3936871bbfe02a6f9d572085c434d1a5ae0ceaa4e619fe12b

    • Size

      101KB

    • MD5

      6ad8912308f3613cf6f90fa6bcfd8b4c

    • SHA1

      3f000d62e5265a2bc0d053db0426d608f9327320

    • SHA256

      0a567390517cbee3936871bbfe02a6f9d572085c434d1a5ae0ceaa4e619fe12b

    • SHA512

      df96f93b22f7129c913445c5f0946d1513c7c2690d0a48d9099921661e113faf34cc551c6cab2a8da1087279bef128e29e56142627da634811a44aa44ad0e025

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks