General

  • Target

    0917dbaab9e1ee6e1bf2d9cedcfac3913f33ed821b50daa81ac3fff45fe91b8a

  • Size

    216KB

  • Sample

    220212-lrj2laagd7

  • MD5

    05ca66dec76c5526bc20373065ce9330

  • SHA1

    dfefaf0cc12c268606d23b271b60e1a13eeba9ea

  • SHA256

    0917dbaab9e1ee6e1bf2d9cedcfac3913f33ed821b50daa81ac3fff45fe91b8a

  • SHA512

    60619def19ee88803af58fd8520982cf8e7749f251f8f085f97884fbd30760b52e01f25124372f77632c9d2eac4ac1d28c6a33e487aeda89f1c26063f8ab503e

Malware Config

Targets

    • Target

      0917dbaab9e1ee6e1bf2d9cedcfac3913f33ed821b50daa81ac3fff45fe91b8a

    • Size

      216KB

    • MD5

      05ca66dec76c5526bc20373065ce9330

    • SHA1

      dfefaf0cc12c268606d23b271b60e1a13eeba9ea

    • SHA256

      0917dbaab9e1ee6e1bf2d9cedcfac3913f33ed821b50daa81ac3fff45fe91b8a

    • SHA512

      60619def19ee88803af58fd8520982cf8e7749f251f8f085f97884fbd30760b52e01f25124372f77632c9d2eac4ac1d28c6a33e487aeda89f1c26063f8ab503e

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks