General

  • Target

    0957e9a41114ff433c62674de12b22f4945441812ac94e96fc1b4c272fa3c36d

  • Size

    79KB

  • Sample

    220212-lnazhsaga8

  • MD5

    f3275c51c40e625f929a4d31c7e7df49

  • SHA1

    03c5d82a0207e41057b83348260a1ca75511b000

  • SHA256

    0957e9a41114ff433c62674de12b22f4945441812ac94e96fc1b4c272fa3c36d

  • SHA512

    ee38c74b0fce51542121d57b9d00b2fc8828215512fe8740dac02dc8eafe178b4d380be57fb35b039b3ab5908ac11a5588ce18ec45eceba3efbca5fd6850cdf1

Malware Config

Targets

    • Target

      0957e9a41114ff433c62674de12b22f4945441812ac94e96fc1b4c272fa3c36d

    • Size

      79KB

    • MD5

      f3275c51c40e625f929a4d31c7e7df49

    • SHA1

      03c5d82a0207e41057b83348260a1ca75511b000

    • SHA256

      0957e9a41114ff433c62674de12b22f4945441812ac94e96fc1b4c272fa3c36d

    • SHA512

      ee38c74b0fce51542121d57b9d00b2fc8828215512fe8740dac02dc8eafe178b4d380be57fb35b039b3ab5908ac11a5588ce18ec45eceba3efbca5fd6850cdf1

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks