General

  • Target

    087bb3e39303be68f42c750d0f1357db40c66dcad542ac9c46da73ad232b4c75

  • Size

    92KB

  • Sample

    220212-lzwqcsahd3

  • MD5

    932b940966fe8158b11cc86cb210567a

  • SHA1

    e7aab3c96fd45233504fcf193ce9a3f2a3f786d1

  • SHA256

    087bb3e39303be68f42c750d0f1357db40c66dcad542ac9c46da73ad232b4c75

  • SHA512

    c03484b9db55f6c3013ce365a319f471ed848336d8ae336d8ebb13b1bd41a9e977f875a995bec7fd224543d0f6d31062eab8dbca67d4ee9018d709b513aa06a7

Malware Config

Targets

    • Target

      087bb3e39303be68f42c750d0f1357db40c66dcad542ac9c46da73ad232b4c75

    • Size

      92KB

    • MD5

      932b940966fe8158b11cc86cb210567a

    • SHA1

      e7aab3c96fd45233504fcf193ce9a3f2a3f786d1

    • SHA256

      087bb3e39303be68f42c750d0f1357db40c66dcad542ac9c46da73ad232b4c75

    • SHA512

      c03484b9db55f6c3013ce365a319f471ed848336d8ae336d8ebb13b1bd41a9e977f875a995bec7fd224543d0f6d31062eab8dbca67d4ee9018d709b513aa06a7

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks