General

  • Target

    0925dd5c5c9fe098be5c665dd41c7991a6895fd35c14f07933152a35e4eb93eb

  • Size

    101KB

  • Sample

    220212-lqxajacdcp

  • MD5

    f7a2edec2100a080989cf073bfb0b722

  • SHA1

    d594871fb453cf9f7114988c2236a6863e4d3c40

  • SHA256

    0925dd5c5c9fe098be5c665dd41c7991a6895fd35c14f07933152a35e4eb93eb

  • SHA512

    c88aa500c0ff95b96c318ef7e6151b0e9984a8873db7d21bae597cf5f49e8455498f5ce9e32d8d3246ad7a99200e55e500200183717f39a6605bd2563b2d4ffa

Malware Config

Targets

    • Target

      0925dd5c5c9fe098be5c665dd41c7991a6895fd35c14f07933152a35e4eb93eb

    • Size

      101KB

    • MD5

      f7a2edec2100a080989cf073bfb0b722

    • SHA1

      d594871fb453cf9f7114988c2236a6863e4d3c40

    • SHA256

      0925dd5c5c9fe098be5c665dd41c7991a6895fd35c14f07933152a35e4eb93eb

    • SHA512

      c88aa500c0ff95b96c318ef7e6151b0e9984a8873db7d21bae597cf5f49e8455498f5ce9e32d8d3246ad7a99200e55e500200183717f39a6605bd2563b2d4ffa

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks