General

  • Target

    0a710836385be9ad100aa711a21a8963fc551e8ca41fa239f6d4c55145f831fa

  • Size

    101KB

  • Sample

    220212-laa3cscbdl

  • MD5

    f272bc465ed1d663cd25b711aad72112

  • SHA1

    b027ff00ba8ff77b6bc1b3c4fddbaf4602f779c9

  • SHA256

    0a710836385be9ad100aa711a21a8963fc551e8ca41fa239f6d4c55145f831fa

  • SHA512

    7bab761845dbfd398d3392b837067d2e8fc7aa4284450a0c3869e81444b4aa930e1e777ea850fb62d09d49e46af385b85a97c31f3021b0ae98e5bbf68ca1d353

Malware Config

Targets

    • Target

      0a710836385be9ad100aa711a21a8963fc551e8ca41fa239f6d4c55145f831fa

    • Size

      101KB

    • MD5

      f272bc465ed1d663cd25b711aad72112

    • SHA1

      b027ff00ba8ff77b6bc1b3c4fddbaf4602f779c9

    • SHA256

      0a710836385be9ad100aa711a21a8963fc551e8ca41fa239f6d4c55145f831fa

    • SHA512

      7bab761845dbfd398d3392b837067d2e8fc7aa4284450a0c3869e81444b4aa930e1e777ea850fb62d09d49e46af385b85a97c31f3021b0ae98e5bbf68ca1d353

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks