General

  • Target

    08c468f424b4548f603355f373344c63ffc097d308ec06cead3c2b9da9efe462

  • Size

    216KB

  • Sample

    220212-lwj76aagh9

  • MD5

    e836d654e01534e39fec95cb7387f6fb

  • SHA1

    fff7ba3b749d2c148da1ac27f83240f75254d054

  • SHA256

    08c468f424b4548f603355f373344c63ffc097d308ec06cead3c2b9da9efe462

  • SHA512

    e54fb6bcd8f87f67b57ca871f1ade181f0a722383ff51d2d0957726ecab7af67a0b461d2b6a38d77e482265415876ce0621b6e3a631088ee6e996b3a6b3307a4

Malware Config

Targets

    • Target

      08c468f424b4548f603355f373344c63ffc097d308ec06cead3c2b9da9efe462

    • Size

      216KB

    • MD5

      e836d654e01534e39fec95cb7387f6fb

    • SHA1

      fff7ba3b749d2c148da1ac27f83240f75254d054

    • SHA256

      08c468f424b4548f603355f373344c63ffc097d308ec06cead3c2b9da9efe462

    • SHA512

      e54fb6bcd8f87f67b57ca871f1ade181f0a722383ff51d2d0957726ecab7af67a0b461d2b6a38d77e482265415876ce0621b6e3a631088ee6e996b3a6b3307a4

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks