General

  • Target

    05750015a1f364c850aa9c56377952e059f4467afb6a1a7a61526edeab5dbd5c

  • Size

    84KB

  • Sample

    220212-m5lb9adbfn

  • MD5

    89660a305761d4eee7a7dd4db4d98174

  • SHA1

    302f4afb0814672a55daf17c959a9184b93e594d

  • SHA256

    05750015a1f364c850aa9c56377952e059f4467afb6a1a7a61526edeab5dbd5c

  • SHA512

    d319a504ba3ce991eb8a11afa47bd27c4f66ae80c5c32fd7ad074fe538eb59870b2a99151c6652de77fdb662fdc490967066d7271e4a69eb92c20a28b2bf9808

Malware Config

Targets

    • Target

      05750015a1f364c850aa9c56377952e059f4467afb6a1a7a61526edeab5dbd5c

    • Size

      84KB

    • MD5

      89660a305761d4eee7a7dd4db4d98174

    • SHA1

      302f4afb0814672a55daf17c959a9184b93e594d

    • SHA256

      05750015a1f364c850aa9c56377952e059f4467afb6a1a7a61526edeab5dbd5c

    • SHA512

      d319a504ba3ce991eb8a11afa47bd27c4f66ae80c5c32fd7ad074fe538eb59870b2a99151c6652de77fdb662fdc490967066d7271e4a69eb92c20a28b2bf9808

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks