General

  • Target

    0a0a5d717ecbf02da0e394b56f1bbf86e52ec2340f8ee8e057b449ff177ad1ac

  • Size

    152KB

  • Sample

    220212-le2qwaafa7

  • MD5

    502b0f83d02e3f5d42fd9c1134235519

  • SHA1

    16da52230e876503a8c106ee6bd8d349241517ee

  • SHA256

    0a0a5d717ecbf02da0e394b56f1bbf86e52ec2340f8ee8e057b449ff177ad1ac

  • SHA512

    bff1adb551ce7b5b413ed7301c35a770a2204fa1b8f46d1f969d4f28d2ffbba41f6a322612ef9a6da0e53017ab33bfcd761bb749f27337a6cc3881b2f2c73f8a

Malware Config

Targets

    • Target

      0a0a5d717ecbf02da0e394b56f1bbf86e52ec2340f8ee8e057b449ff177ad1ac

    • Size

      152KB

    • MD5

      502b0f83d02e3f5d42fd9c1134235519

    • SHA1

      16da52230e876503a8c106ee6bd8d349241517ee

    • SHA256

      0a0a5d717ecbf02da0e394b56f1bbf86e52ec2340f8ee8e057b449ff177ad1ac

    • SHA512

      bff1adb551ce7b5b413ed7301c35a770a2204fa1b8f46d1f969d4f28d2ffbba41f6a322612ef9a6da0e53017ab33bfcd761bb749f27337a6cc3881b2f2c73f8a

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks