General

  • Target

    0a0b10adcb14ddf6c0817206884f3d90c114e21ba96a1825b401eaf49f8d7b9f

  • Size

    191KB

  • Sample

    220212-lezlhscbhp

  • MD5

    c15c7ba556c1cf25ca6c5dfd19555e31

  • SHA1

    bc176b64e59245311a44326fa17cb1fb54eaab15

  • SHA256

    0a0b10adcb14ddf6c0817206884f3d90c114e21ba96a1825b401eaf49f8d7b9f

  • SHA512

    1ca0397cce49a67b8bc3dc44e34e642041201f7215e4de7fc9424de099b587ff4adb1d35e7a69e506d20712337300481554bc3a130ee95144ddb06a80b71e32f

Malware Config

Targets

    • Target

      0a0b10adcb14ddf6c0817206884f3d90c114e21ba96a1825b401eaf49f8d7b9f

    • Size

      191KB

    • MD5

      c15c7ba556c1cf25ca6c5dfd19555e31

    • SHA1

      bc176b64e59245311a44326fa17cb1fb54eaab15

    • SHA256

      0a0b10adcb14ddf6c0817206884f3d90c114e21ba96a1825b401eaf49f8d7b9f

    • SHA512

      1ca0397cce49a67b8bc3dc44e34e642041201f7215e4de7fc9424de099b587ff4adb1d35e7a69e506d20712337300481554bc3a130ee95144ddb06a80b71e32f

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks