General

  • Target

    0a0cdbe359ab06d40e4572ffb79646047b51b2dd4745dfe011f4c7e67fa0d993

  • Size

    191KB

  • Sample

    220212-lexf6acbhn

  • MD5

    bcc1a1c4e2973c6187e5ab70c38e4ec6

  • SHA1

    41a3baaf24e4f0b61894a0fec064bcbe4dbe9e98

  • SHA256

    0a0cdbe359ab06d40e4572ffb79646047b51b2dd4745dfe011f4c7e67fa0d993

  • SHA512

    c2bc65355e37216676fcda1d8800abfe62929af4601fc461312ed70b504350120e2d7b9aebc835dbbe5d1ee1ae20d343d94320bc494e13df3152d06a2bf61e21

Malware Config

Targets

    • Target

      0a0cdbe359ab06d40e4572ffb79646047b51b2dd4745dfe011f4c7e67fa0d993

    • Size

      191KB

    • MD5

      bcc1a1c4e2973c6187e5ab70c38e4ec6

    • SHA1

      41a3baaf24e4f0b61894a0fec064bcbe4dbe9e98

    • SHA256

      0a0cdbe359ab06d40e4572ffb79646047b51b2dd4745dfe011f4c7e67fa0d993

    • SHA512

      c2bc65355e37216676fcda1d8800abfe62929af4601fc461312ed70b504350120e2d7b9aebc835dbbe5d1ee1ae20d343d94320bc494e13df3152d06a2bf61e21

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks