General

  • Target

    091751c441f73ec452289edc4f8996d03ffa836df68db13e369b460c3af06f79

  • Size

    80KB

  • Sample

    220212-lrl6yscddn

  • MD5

    4ebe8c3822c2bffd4a8bdbbc29c6754d

  • SHA1

    d6f50eabc1794031d89f5f080a16ca6d30ee60e1

  • SHA256

    091751c441f73ec452289edc4f8996d03ffa836df68db13e369b460c3af06f79

  • SHA512

    e011ab23839d44b587bed12d5c8a1dcd4ddc1bcbf4fbd0c15a82310529cf927f28a5c009dde02dabe26eb8d28e11e055d3cdb648638f56fec01cf012b516ea4c

Malware Config

Targets

    • Target

      091751c441f73ec452289edc4f8996d03ffa836df68db13e369b460c3af06f79

    • Size

      80KB

    • MD5

      4ebe8c3822c2bffd4a8bdbbc29c6754d

    • SHA1

      d6f50eabc1794031d89f5f080a16ca6d30ee60e1

    • SHA256

      091751c441f73ec452289edc4f8996d03ffa836df68db13e369b460c3af06f79

    • SHA512

      e011ab23839d44b587bed12d5c8a1dcd4ddc1bcbf4fbd0c15a82310529cf927f28a5c009dde02dabe26eb8d28e11e055d3cdb648638f56fec01cf012b516ea4c

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks