General

  • Target

    05acaeae4f408eff2d8d5138f54c0d62ddc04bd62860a3822d35203988225a48

  • Size

    101KB

  • Sample

    220212-m2lhvadbbn

  • MD5

    a0ef1add4c8b74b86adbb58738c485ce

  • SHA1

    93db3843393fbad2690c4c5cab33baefa80c772e

  • SHA256

    05acaeae4f408eff2d8d5138f54c0d62ddc04bd62860a3822d35203988225a48

  • SHA512

    79c3eacc5f449a95abc018692c03a2ffe2c4c7a8fe477e7bd9e70ccad4dead0c57c7d01ad5fae8806a491056b353fecef23e2fb55752ebb1929793b2acad8582

Malware Config

Targets

    • Target

      05acaeae4f408eff2d8d5138f54c0d62ddc04bd62860a3822d35203988225a48

    • Size

      101KB

    • MD5

      a0ef1add4c8b74b86adbb58738c485ce

    • SHA1

      93db3843393fbad2690c4c5cab33baefa80c772e

    • SHA256

      05acaeae4f408eff2d8d5138f54c0d62ddc04bd62860a3822d35203988225a48

    • SHA512

      79c3eacc5f449a95abc018692c03a2ffe2c4c7a8fe477e7bd9e70ccad4dead0c57c7d01ad5fae8806a491056b353fecef23e2fb55752ebb1929793b2acad8582

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks