General

  • Target

    0a490c2b49a7ecc9e5a84e2ec50ccd3b7a570daf629eafb8831a4ebf4e684153

  • Size

    58KB

  • Sample

    220212-lbvhdscbfm

  • MD5

    6bc2cf16f200ad0b7458f4ef80ee85a4

  • SHA1

    a15283bacc02be3b701b21353a0a105359ae22a6

  • SHA256

    0a490c2b49a7ecc9e5a84e2ec50ccd3b7a570daf629eafb8831a4ebf4e684153

  • SHA512

    f35105cd6fa9b0471c580fbff6aa61c240eae4dab49ac1391690b70989700c4ce2c838e18ca89206c63ed769797f14b2cdaf0a965d38c1df36a44a2961fed6af

Malware Config

Targets

    • Target

      0a490c2b49a7ecc9e5a84e2ec50ccd3b7a570daf629eafb8831a4ebf4e684153

    • Size

      58KB

    • MD5

      6bc2cf16f200ad0b7458f4ef80ee85a4

    • SHA1

      a15283bacc02be3b701b21353a0a105359ae22a6

    • SHA256

      0a490c2b49a7ecc9e5a84e2ec50ccd3b7a570daf629eafb8831a4ebf4e684153

    • SHA512

      f35105cd6fa9b0471c580fbff6aa61c240eae4dab49ac1391690b70989700c4ce2c838e18ca89206c63ed769797f14b2cdaf0a965d38c1df36a44a2961fed6af

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks