General

  • Target

    16f94f6113db1fb78731906d86094e40abc33c9625b4cc7855315c2e1d5ef7ec

  • Size

    58KB

  • Sample

    220212-d82zqsfeh2

  • MD5

    9384044ce8cdca1754cb3f65353c83b8

  • SHA1

    835d6d22da8eb20c8583085f481fe8bab796c75b

  • SHA256

    16f94f6113db1fb78731906d86094e40abc33c9625b4cc7855315c2e1d5ef7ec

  • SHA512

    2658f20d05480463298ae005f6ec62ab97a2fb14e94538543b72daa70865e6ff5f5b20fbc32f3c5faf489193745c84ba221c697415a8ad78967d91531ceb7f89

Malware Config

Targets

    • Target

      16f94f6113db1fb78731906d86094e40abc33c9625b4cc7855315c2e1d5ef7ec

    • Size

      58KB

    • MD5

      9384044ce8cdca1754cb3f65353c83b8

    • SHA1

      835d6d22da8eb20c8583085f481fe8bab796c75b

    • SHA256

      16f94f6113db1fb78731906d86094e40abc33c9625b4cc7855315c2e1d5ef7ec

    • SHA512

      2658f20d05480463298ae005f6ec62ab97a2fb14e94538543b72daa70865e6ff5f5b20fbc32f3c5faf489193745c84ba221c697415a8ad78967d91531ceb7f89

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks