General

  • Target

    0a3abd1b4ac0124d2e8c6d3624806ba9916710b86ba9e1a88e41bb085db80088

  • Size

    58KB

  • Sample

    220212-lcn21aaef7

  • MD5

    02373a00d8dece4b46e0f7b742175a68

  • SHA1

    bed85df05f74082122af987e5e9907451ba49525

  • SHA256

    0a3abd1b4ac0124d2e8c6d3624806ba9916710b86ba9e1a88e41bb085db80088

  • SHA512

    9735a1de658ed1aff21d7a6a1126fead7fcccb19f99c58aa2965adf964be622250497610efc8a4d83e9f1d2c837a4b56dea6e91fbda4d29ab16f589e5e7ca6b3

Malware Config

Targets

    • Target

      0a3abd1b4ac0124d2e8c6d3624806ba9916710b86ba9e1a88e41bb085db80088

    • Size

      58KB

    • MD5

      02373a00d8dece4b46e0f7b742175a68

    • SHA1

      bed85df05f74082122af987e5e9907451ba49525

    • SHA256

      0a3abd1b4ac0124d2e8c6d3624806ba9916710b86ba9e1a88e41bb085db80088

    • SHA512

      9735a1de658ed1aff21d7a6a1126fead7fcccb19f99c58aa2965adf964be622250497610efc8a4d83e9f1d2c837a4b56dea6e91fbda4d29ab16f589e5e7ca6b3

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks