General

  • Target

    0a29b5d068e66cba4a2364ee92601f800f0f24fe9dafca82aafb00adcf3d282e

  • Size

    80KB

  • Sample

    220212-ldfr1saeg9

  • MD5

    bb470f50829086c6c28faa079d151b59

  • SHA1

    3117c9041a3542ceeea3322ce38eaeda976a2706

  • SHA256

    0a29b5d068e66cba4a2364ee92601f800f0f24fe9dafca82aafb00adcf3d282e

  • SHA512

    62e2146cb11bb9be1f8624202544fcad7fa8876728702340e26c60b6fb18c482be27df5117e4a776dcf4d21e796230a2623d70d4ae9e2977c9938897992f15a1

Malware Config

Targets

    • Target

      0a29b5d068e66cba4a2364ee92601f800f0f24fe9dafca82aafb00adcf3d282e

    • Size

      80KB

    • MD5

      bb470f50829086c6c28faa079d151b59

    • SHA1

      3117c9041a3542ceeea3322ce38eaeda976a2706

    • SHA256

      0a29b5d068e66cba4a2364ee92601f800f0f24fe9dafca82aafb00adcf3d282e

    • SHA512

      62e2146cb11bb9be1f8624202544fcad7fa8876728702340e26c60b6fb18c482be27df5117e4a776dcf4d21e796230a2623d70d4ae9e2977c9938897992f15a1

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks