General

  • Target

    0a26f71568e6e2580a8639ab242af093e765e4fe3df1695e3a89e417fd6b1c9d

  • Size

    58KB

  • Sample

    220212-ldtnwacbgl

  • MD5

    b17dca22178eb65a31b8193d3ac39027

  • SHA1

    d37ddf8811aa6315d7901346c72840161ef64c49

  • SHA256

    0a26f71568e6e2580a8639ab242af093e765e4fe3df1695e3a89e417fd6b1c9d

  • SHA512

    1a3449455a250ece7d09e056dda063b2f86d44702d73dd45a6214f024de156bb22917fc28aac798c5c0f93ede7142caf065017f1fbab36353272abc0abc1136a

Malware Config

Targets

    • Target

      0a26f71568e6e2580a8639ab242af093e765e4fe3df1695e3a89e417fd6b1c9d

    • Size

      58KB

    • MD5

      b17dca22178eb65a31b8193d3ac39027

    • SHA1

      d37ddf8811aa6315d7901346c72840161ef64c49

    • SHA256

      0a26f71568e6e2580a8639ab242af093e765e4fe3df1695e3a89e417fd6b1c9d

    • SHA512

      1a3449455a250ece7d09e056dda063b2f86d44702d73dd45a6214f024de156bb22917fc28aac798c5c0f93ede7142caf065017f1fbab36353272abc0abc1136a

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks