General

  • Target

    09761ddb95ff9bfad75d25f90ce35bae69ebb36f557b17b3faa4d33bac9d9c96

  • Size

    80KB

  • Sample

    220212-ll4ttaafh8

  • MD5

    22632819c4c99dcbddfa629c6d0ec7ef

  • SHA1

    48c2bd530c57be4e9b364fa060e5aff4dadcd162

  • SHA256

    09761ddb95ff9bfad75d25f90ce35bae69ebb36f557b17b3faa4d33bac9d9c96

  • SHA512

    3ce998328d3a927b33fbd8f960c7f02b1e007f8f6964eb51a3d41be329b318be896873278f090707adc1dbcbdd08caf3edcf47f358f9fbeac7d9515a6f591aaa

Malware Config

Targets

    • Target

      09761ddb95ff9bfad75d25f90ce35bae69ebb36f557b17b3faa4d33bac9d9c96

    • Size

      80KB

    • MD5

      22632819c4c99dcbddfa629c6d0ec7ef

    • SHA1

      48c2bd530c57be4e9b364fa060e5aff4dadcd162

    • SHA256

      09761ddb95ff9bfad75d25f90ce35bae69ebb36f557b17b3faa4d33bac9d9c96

    • SHA512

      3ce998328d3a927b33fbd8f960c7f02b1e007f8f6964eb51a3d41be329b318be896873278f090707adc1dbcbdd08caf3edcf47f358f9fbeac7d9515a6f591aaa

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks