General

  • Target

    0913fb0f15766f114260988ca4ea9dfff0f5397103cff7e840e909371d236c7c

  • Size

    99KB

  • Sample

    220212-lrv4vsagd9

  • MD5

    29e53ba3bd4a5f2e084072c7ff9b976b

  • SHA1

    165a3de449d833cc993f54accb2f4cdd67b4bcb4

  • SHA256

    0913fb0f15766f114260988ca4ea9dfff0f5397103cff7e840e909371d236c7c

  • SHA512

    0f599813b470eaa96397667b6bd81c79c1d58aa8de37be3fb48cac2f68b93b3f8a77175a62fdf2093631dee1294083019bfd540a1b2bd3c9e2211db94d7f8380

Malware Config

Targets

    • Target

      0913fb0f15766f114260988ca4ea9dfff0f5397103cff7e840e909371d236c7c

    • Size

      99KB

    • MD5

      29e53ba3bd4a5f2e084072c7ff9b976b

    • SHA1

      165a3de449d833cc993f54accb2f4cdd67b4bcb4

    • SHA256

      0913fb0f15766f114260988ca4ea9dfff0f5397103cff7e840e909371d236c7c

    • SHA512

      0f599813b470eaa96397667b6bd81c79c1d58aa8de37be3fb48cac2f68b93b3f8a77175a62fdf2093631dee1294083019bfd540a1b2bd3c9e2211db94d7f8380

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks