General

  • Target

    02b38e65003d4a792ff43706fc0691225c92962694c43c5b8f4346832979efcd

  • Size

    58KB

  • Sample

    220212-n69lxacae9

  • MD5

    a2235d0d903726cd76af8383e496d995

  • SHA1

    58522c9367f10971b80a3eff5a9cbe7f09575534

  • SHA256

    02b38e65003d4a792ff43706fc0691225c92962694c43c5b8f4346832979efcd

  • SHA512

    9c2f840fae75ebf41f3fabf0d0d4d1ddd04f5bd3c972bbefcf0aef5c0bb5c70b422bb1feb9203674561f001dbb72cdb0d738f30f49bde7ee8f70f4683484c057

Malware Config

Targets

    • Target

      02b38e65003d4a792ff43706fc0691225c92962694c43c5b8f4346832979efcd

    • Size

      58KB

    • MD5

      a2235d0d903726cd76af8383e496d995

    • SHA1

      58522c9367f10971b80a3eff5a9cbe7f09575534

    • SHA256

      02b38e65003d4a792ff43706fc0691225c92962694c43c5b8f4346832979efcd

    • SHA512

      9c2f840fae75ebf41f3fabf0d0d4d1ddd04f5bd3c972bbefcf0aef5c0bb5c70b422bb1feb9203674561f001dbb72cdb0d738f30f49bde7ee8f70f4683484c057

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks