General

  • Target

    09d065faf34378cbaf232d14a8fc3728957551983c7dcc214840b287b0ccf65e

  • Size

    36KB

  • Sample

    220212-lgw86sccck

  • MD5

    e1dc423f3ae47863386617e294d9aee3

  • SHA1

    11474802648aa402b1bc56e514984e8992985543

  • SHA256

    09d065faf34378cbaf232d14a8fc3728957551983c7dcc214840b287b0ccf65e

  • SHA512

    fb2af136dbdb1f68452f101b52fe8b82d0c52971df03752195cbb3892795d2b8c2c0d6a63778b582d93d5d0b49c9222a58a1ecfcf25c11a658d076fc979e27ba

Malware Config

Targets

    • Target

      09d065faf34378cbaf232d14a8fc3728957551983c7dcc214840b287b0ccf65e

    • Size

      36KB

    • MD5

      e1dc423f3ae47863386617e294d9aee3

    • SHA1

      11474802648aa402b1bc56e514984e8992985543

    • SHA256

      09d065faf34378cbaf232d14a8fc3728957551983c7dcc214840b287b0ccf65e

    • SHA512

      fb2af136dbdb1f68452f101b52fe8b82d0c52971df03752195cbb3892795d2b8c2c0d6a63778b582d93d5d0b49c9222a58a1ecfcf25c11a658d076fc979e27ba

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks