General

  • Target

    0973d3010ee016d92584ce8ccd3ec56b007a33369f3f7a25d952965257d20bfc

  • Size

    100KB

  • Sample

    220212-lme7vaccgm

  • MD5

    30be8982448cdb1450e6408680242cfc

  • SHA1

    6c57340709f9ef3b179d4a069a282277ba7ad57d

  • SHA256

    0973d3010ee016d92584ce8ccd3ec56b007a33369f3f7a25d952965257d20bfc

  • SHA512

    be806e030c16dced433fe14785c97546714a82c12231d54967c8ea41ad83846f38222d5148b0e0b4beb0d14121492a4c78b319d6ecb8607a3716e6a760e7a973

Malware Config

Targets

    • Target

      0973d3010ee016d92584ce8ccd3ec56b007a33369f3f7a25d952965257d20bfc

    • Size

      100KB

    • MD5

      30be8982448cdb1450e6408680242cfc

    • SHA1

      6c57340709f9ef3b179d4a069a282277ba7ad57d

    • SHA256

      0973d3010ee016d92584ce8ccd3ec56b007a33369f3f7a25d952965257d20bfc

    • SHA512

      be806e030c16dced433fe14785c97546714a82c12231d54967c8ea41ad83846f38222d5148b0e0b4beb0d14121492a4c78b319d6ecb8607a3716e6a760e7a973

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks