General

  • Target

    092bff8ae1d6e3fe03e7594914ae701a7d3ad8fb68cc29b77d1eec5f81016601

  • Size

    60KB

  • Sample

    220212-lqmq4acdcl

  • MD5

    5c434a9ff5342b0bec6f41b0ce1e93ba

  • SHA1

    61dbdea83099165f1572e9712fef4a0cc400b7e3

  • SHA256

    092bff8ae1d6e3fe03e7594914ae701a7d3ad8fb68cc29b77d1eec5f81016601

  • SHA512

    75b8b1ded7466bf3759ddb9503b7a74b31b7821d709c839e6f0e96aa2dff32eb86804d736b45890e08f795a7146972ffe02bc2582e061b98fb952314abb1b694

Malware Config

Targets

    • Target

      092bff8ae1d6e3fe03e7594914ae701a7d3ad8fb68cc29b77d1eec5f81016601

    • Size

      60KB

    • MD5

      5c434a9ff5342b0bec6f41b0ce1e93ba

    • SHA1

      61dbdea83099165f1572e9712fef4a0cc400b7e3

    • SHA256

      092bff8ae1d6e3fe03e7594914ae701a7d3ad8fb68cc29b77d1eec5f81016601

    • SHA512

      75b8b1ded7466bf3759ddb9503b7a74b31b7821d709c839e6f0e96aa2dff32eb86804d736b45890e08f795a7146972ffe02bc2582e061b98fb952314abb1b694

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks