General

  • Target

    08ff6b2178aad1544c4a38ac1662829d2513edf5a52d759bc74ec544c53c0279

  • Size

    168KB

  • Sample

    220212-ltb4rsagf4

  • MD5

    9b8fc69dc74ae8de2dbc55a6f3c81b78

  • SHA1

    32307e9ce4c8dd322ae08a87c53c8d68aea08304

  • SHA256

    08ff6b2178aad1544c4a38ac1662829d2513edf5a52d759bc74ec544c53c0279

  • SHA512

    661b133f4f6c02e9841338a60a66aaf570563f105e91fce3e2db0e7b1a6b4b8eed81d4f5f406b505ec4ac8e43e06cbe880239374bfcfb40fcadc05066fa46e6a

Malware Config

Targets

    • Target

      08ff6b2178aad1544c4a38ac1662829d2513edf5a52d759bc74ec544c53c0279

    • Size

      168KB

    • MD5

      9b8fc69dc74ae8de2dbc55a6f3c81b78

    • SHA1

      32307e9ce4c8dd322ae08a87c53c8d68aea08304

    • SHA256

      08ff6b2178aad1544c4a38ac1662829d2513edf5a52d759bc74ec544c53c0279

    • SHA512

      661b133f4f6c02e9841338a60a66aaf570563f105e91fce3e2db0e7b1a6b4b8eed81d4f5f406b505ec4ac8e43e06cbe880239374bfcfb40fcadc05066fa46e6a

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks