General

  • Target

    09b35ef51a31817d84f0937c070200cc6f75fe73f892a19d00f0af9ec19ac8c2

  • Size

    92KB

  • Sample

    220212-lh65rsafe3

  • MD5

    29e26e51b1c978c7366dcca103a09346

  • SHA1

    b8bf38ac669889aefcbfb26866db9ddca5cb5e24

  • SHA256

    09b35ef51a31817d84f0937c070200cc6f75fe73f892a19d00f0af9ec19ac8c2

  • SHA512

    edff47b10e78a18ec4742d52800a868efdfeef0c4d54a3da51ec5609052ae65f634bbaabbeb6de802a1f48ff9ce4911bb3566a0e304f19794d28d37c4d72fe82

Malware Config

Targets

    • Target

      09b35ef51a31817d84f0937c070200cc6f75fe73f892a19d00f0af9ec19ac8c2

    • Size

      92KB

    • MD5

      29e26e51b1c978c7366dcca103a09346

    • SHA1

      b8bf38ac669889aefcbfb26866db9ddca5cb5e24

    • SHA256

      09b35ef51a31817d84f0937c070200cc6f75fe73f892a19d00f0af9ec19ac8c2

    • SHA512

      edff47b10e78a18ec4742d52800a868efdfeef0c4d54a3da51ec5609052ae65f634bbaabbeb6de802a1f48ff9ce4911bb3566a0e304f19794d28d37c4d72fe82

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks