General

  • Target

    09b8ecdeea3eb74d51071bfbbe5179e669050cab1318c1a40765ba2e803a78c9

  • Size

    58KB

  • Sample

    220212-lh41eaafe2

  • MD5

    e1ce252de79420c186c6fcc9a366f968

  • SHA1

    c7d3002fcbd854d413a542f50bc98644e0836634

  • SHA256

    09b8ecdeea3eb74d51071bfbbe5179e669050cab1318c1a40765ba2e803a78c9

  • SHA512

    30a8339812b513592d3dbcb2e9927e7e3c7a1701f33dd6370b4e968ddbc37f11b6b8633f5fcdd6340e0f844b4e27fe7388f1aafa2f33495652cbeff6731bb7bb

Malware Config

Targets

    • Target

      09b8ecdeea3eb74d51071bfbbe5179e669050cab1318c1a40765ba2e803a78c9

    • Size

      58KB

    • MD5

      e1ce252de79420c186c6fcc9a366f968

    • SHA1

      c7d3002fcbd854d413a542f50bc98644e0836634

    • SHA256

      09b8ecdeea3eb74d51071bfbbe5179e669050cab1318c1a40765ba2e803a78c9

    • SHA512

      30a8339812b513592d3dbcb2e9927e7e3c7a1701f33dd6370b4e968ddbc37f11b6b8633f5fcdd6340e0f844b4e27fe7388f1aafa2f33495652cbeff6731bb7bb

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks