General

  • Target

    0a6afc01743660dd45a30b04ffb1852e846a203c51f22e0cfee28542b0d61dc0

  • Size

    36KB

  • Sample

    220212-lafb3saed4

  • MD5

    7de82b6c0dbc61c8eaefd0c026269893

  • SHA1

    036a9af8dcef2b33301a3026798a0c84e0c1eaa2

  • SHA256

    0a6afc01743660dd45a30b04ffb1852e846a203c51f22e0cfee28542b0d61dc0

  • SHA512

    f0c115866e3447710bf12de3045995c9e68b03c7034c3dd230703ee6b6a836befb55642ecae11793c2116e731b595c54f57ae880203fb4eef1c1cd86ac049839

Malware Config

Targets

    • Target

      0a6afc01743660dd45a30b04ffb1852e846a203c51f22e0cfee28542b0d61dc0

    • Size

      36KB

    • MD5

      7de82b6c0dbc61c8eaefd0c026269893

    • SHA1

      036a9af8dcef2b33301a3026798a0c84e0c1eaa2

    • SHA256

      0a6afc01743660dd45a30b04ffb1852e846a203c51f22e0cfee28542b0d61dc0

    • SHA512

      f0c115866e3447710bf12de3045995c9e68b03c7034c3dd230703ee6b6a836befb55642ecae11793c2116e731b595c54f57ae880203fb4eef1c1cd86ac049839

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks