General

  • Target

    099711ac3e0d80f59fd96d11082a2f27571b6d70ba76de07e9e4f52b44b2637d

  • Size

    35KB

  • Sample

    220212-lkb3eaccem

  • MD5

    ca050cb980c4e1c3183d1a1e6d35be97

  • SHA1

    52de54ab815cd9ffe60459de44f3aa970e8293f8

  • SHA256

    099711ac3e0d80f59fd96d11082a2f27571b6d70ba76de07e9e4f52b44b2637d

  • SHA512

    b2430c7e91cafe99e497225b918893357ea9bfb12942f80020cad30e7a522adfd878782fe632553efd39f2c920971366dee646554ef17f58d491e3f9d7ffd84d

Malware Config

Targets

    • Target

      099711ac3e0d80f59fd96d11082a2f27571b6d70ba76de07e9e4f52b44b2637d

    • Size

      35KB

    • MD5

      ca050cb980c4e1c3183d1a1e6d35be97

    • SHA1

      52de54ab815cd9ffe60459de44f3aa970e8293f8

    • SHA256

      099711ac3e0d80f59fd96d11082a2f27571b6d70ba76de07e9e4f52b44b2637d

    • SHA512

      b2430c7e91cafe99e497225b918893357ea9bfb12942f80020cad30e7a522adfd878782fe632553efd39f2c920971366dee646554ef17f58d491e3f9d7ffd84d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks