General

  • Target

    097a20a27c7283a4d270dae11e52f3f78c6b4af3f9949aeb6ab105d66b8763d2

  • Size

    99KB

  • Sample

    220212-llngtsafh5

  • MD5

    646ac3230a8cccfcb5820b623cfab2a5

  • SHA1

    4c966ba5e0965d081d398fc5035669d658a44d64

  • SHA256

    097a20a27c7283a4d270dae11e52f3f78c6b4af3f9949aeb6ab105d66b8763d2

  • SHA512

    84d61d5bc39d3d09db7ae5da79856ea6cde1675b7ad8f624575c89dad83cf499142f50c0dcc0364785058bc9b38b640bee394214a8942d95aa14d849326486bf

Malware Config

Targets

    • Target

      097a20a27c7283a4d270dae11e52f3f78c6b4af3f9949aeb6ab105d66b8763d2

    • Size

      99KB

    • MD5

      646ac3230a8cccfcb5820b623cfab2a5

    • SHA1

      4c966ba5e0965d081d398fc5035669d658a44d64

    • SHA256

      097a20a27c7283a4d270dae11e52f3f78c6b4af3f9949aeb6ab105d66b8763d2

    • SHA512

      84d61d5bc39d3d09db7ae5da79856ea6cde1675b7ad8f624575c89dad83cf499142f50c0dcc0364785058bc9b38b640bee394214a8942d95aa14d849326486bf

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks