General

  • Target

    0a52c64f0963d5334d47924640ce13da3a93d42cb05d141fcc05eb42a18fc844

  • Size

    80KB

  • Sample

    220212-lbk9qaaed9

  • MD5

    3df0a16cd79bdeeea9942c3476de8913

  • SHA1

    1cab9e6b21e81a68a129c13c1653ce9d7df91638

  • SHA256

    0a52c64f0963d5334d47924640ce13da3a93d42cb05d141fcc05eb42a18fc844

  • SHA512

    e9e9fc7f4b64211d77670bbbfac222a0cae19be100be27fef584e36ba33238b0dd7c93956d410a9d32508736a1af6509cfe25e06ccad1ba17c1d191c424615fb

Malware Config

Targets

    • Target

      0a52c64f0963d5334d47924640ce13da3a93d42cb05d141fcc05eb42a18fc844

    • Size

      80KB

    • MD5

      3df0a16cd79bdeeea9942c3476de8913

    • SHA1

      1cab9e6b21e81a68a129c13c1653ce9d7df91638

    • SHA256

      0a52c64f0963d5334d47924640ce13da3a93d42cb05d141fcc05eb42a18fc844

    • SHA512

      e9e9fc7f4b64211d77670bbbfac222a0cae19be100be27fef584e36ba33238b0dd7c93956d410a9d32508736a1af6509cfe25e06ccad1ba17c1d191c424615fb

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks