General

  • Target

    0a2c4ab59d9c210c763a79fe754ce1d8edc6fcacb33b6cf58b65582bcb48cb17

  • Size

    101KB

  • Sample

    220212-ldbhasaeg7

  • MD5

    b31f6f46fcecd13d16058ac3201f9f1a

  • SHA1

    cebf672d4e5be2854241462ed91893e4123ca9b7

  • SHA256

    0a2c4ab59d9c210c763a79fe754ce1d8edc6fcacb33b6cf58b65582bcb48cb17

  • SHA512

    ad99f5460c587f2e9c3669354925a719c49ba51aec9c58146e5bd05d06a30ff29f6c1bb4501bf19794c9250c278d6b97954efa7c110e2843e4cff3ca40b94dba

Malware Config

Targets

    • Target

      0a2c4ab59d9c210c763a79fe754ce1d8edc6fcacb33b6cf58b65582bcb48cb17

    • Size

      101KB

    • MD5

      b31f6f46fcecd13d16058ac3201f9f1a

    • SHA1

      cebf672d4e5be2854241462ed91893e4123ca9b7

    • SHA256

      0a2c4ab59d9c210c763a79fe754ce1d8edc6fcacb33b6cf58b65582bcb48cb17

    • SHA512

      ad99f5460c587f2e9c3669354925a719c49ba51aec9c58146e5bd05d06a30ff29f6c1bb4501bf19794c9250c278d6b97954efa7c110e2843e4cff3ca40b94dba

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks