General

  • Target

    08b47593f4fb7edbe5a42d467c206dd90391809c8cc8e31e9cd8dbb69700b77b

  • Size

    104KB

  • Sample

    220212-lw1vxaceak

  • MD5

    cb2812da429929a75f516367fbade4cf

  • SHA1

    5216a07127be56ad2c03f2327fd2fb90a00ede60

  • SHA256

    08b47593f4fb7edbe5a42d467c206dd90391809c8cc8e31e9cd8dbb69700b77b

  • SHA512

    4375147ec89564103ac566ea1dd9cee27c426376fbabe824bc37ce1b6bb39b41fb9e8b6866e90b38ad88cd1b33b7bc05b7840a18136ecd2634277d3eb270f069

Malware Config

Targets

    • Target

      08b47593f4fb7edbe5a42d467c206dd90391809c8cc8e31e9cd8dbb69700b77b

    • Size

      104KB

    • MD5

      cb2812da429929a75f516367fbade4cf

    • SHA1

      5216a07127be56ad2c03f2327fd2fb90a00ede60

    • SHA256

      08b47593f4fb7edbe5a42d467c206dd90391809c8cc8e31e9cd8dbb69700b77b

    • SHA512

      4375147ec89564103ac566ea1dd9cee27c426376fbabe824bc37ce1b6bb39b41fb9e8b6866e90b38ad88cd1b33b7bc05b7840a18136ecd2634277d3eb270f069

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks