General

  • Target

    09cf62760f0e1171fa2bca08887743056b65abbf06909ecbaf7f7da48aced5c4

  • Size

    99KB

  • Sample

    220212-lg4y1safd2

  • MD5

    e5c7613198df757173f718060c40c401

  • SHA1

    5b4a177f528f1da95be286a86a02a446a9a01842

  • SHA256

    09cf62760f0e1171fa2bca08887743056b65abbf06909ecbaf7f7da48aced5c4

  • SHA512

    feab5bc0ac67bc73ac9e757c187d27ff7185188c8ba91c96e884159e6fab91615037f3fec8e1cd27810834402bb3ce0f3c4b8b02527e39b6ef4ccbc022d43e98

Malware Config

Targets

    • Target

      09cf62760f0e1171fa2bca08887743056b65abbf06909ecbaf7f7da48aced5c4

    • Size

      99KB

    • MD5

      e5c7613198df757173f718060c40c401

    • SHA1

      5b4a177f528f1da95be286a86a02a446a9a01842

    • SHA256

      09cf62760f0e1171fa2bca08887743056b65abbf06909ecbaf7f7da48aced5c4

    • SHA512

      feab5bc0ac67bc73ac9e757c187d27ff7185188c8ba91c96e884159e6fab91615037f3fec8e1cd27810834402bb3ce0f3c4b8b02527e39b6ef4ccbc022d43e98

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks