General

  • Target

    09f350fe65b7a9e0120250707bae8ee945b6b33f8229275e8b096e84a2d977fb

  • Size

    60KB

  • Sample

    220212-lft3esafb8

  • MD5

    935708911966d9f48ad381e8c0887589

  • SHA1

    42cd731c525d7565e35d1c222daf59da089f15f7

  • SHA256

    09f350fe65b7a9e0120250707bae8ee945b6b33f8229275e8b096e84a2d977fb

  • SHA512

    65e87101127871ecc3396eb865b0f6a9e87ed2925d739f4c23ab5f62835da4372b494fa275a2fb81cba71d97c97b10c1bf711d3ca2ffa28c2cfd8daf826dcf38

Malware Config

Targets

    • Target

      09f350fe65b7a9e0120250707bae8ee945b6b33f8229275e8b096e84a2d977fb

    • Size

      60KB

    • MD5

      935708911966d9f48ad381e8c0887589

    • SHA1

      42cd731c525d7565e35d1c222daf59da089f15f7

    • SHA256

      09f350fe65b7a9e0120250707bae8ee945b6b33f8229275e8b096e84a2d977fb

    • SHA512

      65e87101127871ecc3396eb865b0f6a9e87ed2925d739f4c23ab5f62835da4372b494fa275a2fb81cba71d97c97b10c1bf711d3ca2ffa28c2cfd8daf826dcf38

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks