General

  • Target

    05aff5d43ff5acf89e5fbef8ae0854f530823f27ac87931c3d41b08be3d7c0f3

  • Size

    184KB

  • Sample

    220212-m18lzsbea4

  • MD5

    d1a92672dcb10a40bb74cefdb41b48bd

  • SHA1

    93371d605d91dac4ae6886f0a0610249d7eb0f9b

  • SHA256

    05aff5d43ff5acf89e5fbef8ae0854f530823f27ac87931c3d41b08be3d7c0f3

  • SHA512

    4f2078ddc336f068a1d8beba2b293711a19d58ec7943cfbc6e44b7441625d51e5a3401daa63c662275495a279f55b355c9bf64893ac5649e9b5d4d7466aa8347

Malware Config

Targets

    • Target

      05aff5d43ff5acf89e5fbef8ae0854f530823f27ac87931c3d41b08be3d7c0f3

    • Size

      184KB

    • MD5

      d1a92672dcb10a40bb74cefdb41b48bd

    • SHA1

      93371d605d91dac4ae6886f0a0610249d7eb0f9b

    • SHA256

      05aff5d43ff5acf89e5fbef8ae0854f530823f27ac87931c3d41b08be3d7c0f3

    • SHA512

      4f2078ddc336f068a1d8beba2b293711a19d58ec7943cfbc6e44b7441625d51e5a3401daa63c662275495a279f55b355c9bf64893ac5649e9b5d4d7466aa8347

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks