General

  • Target

    0a2fcd2408cf7bc76f8fe4dd15883bd5fc4ce7934470fa5322bb6f76bc6688d2

  • Size

    150KB

  • Sample

    220212-lc5dzsaeg4

  • MD5

    408d9310695c796628ef0214fea140ea

  • SHA1

    8a9feb04ab3a1e8b00665c19f41007045a5d17a1

  • SHA256

    0a2fcd2408cf7bc76f8fe4dd15883bd5fc4ce7934470fa5322bb6f76bc6688d2

  • SHA512

    2d9c292fe195bd72499abd454904f2929b360897f24bfa1139400396ae1e65be1f322ef704afb34f3d11ebafcf1bbfd13f20aa1f1154c6114d88a7d6007721a7

Malware Config

Targets

    • Target

      0a2fcd2408cf7bc76f8fe4dd15883bd5fc4ce7934470fa5322bb6f76bc6688d2

    • Size

      150KB

    • MD5

      408d9310695c796628ef0214fea140ea

    • SHA1

      8a9feb04ab3a1e8b00665c19f41007045a5d17a1

    • SHA256

      0a2fcd2408cf7bc76f8fe4dd15883bd5fc4ce7934470fa5322bb6f76bc6688d2

    • SHA512

      2d9c292fe195bd72499abd454904f2929b360897f24bfa1139400396ae1e65be1f322ef704afb34f3d11ebafcf1bbfd13f20aa1f1154c6114d88a7d6007721a7

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks