General

  • Target

    16f88aa903b5852e640c8b007d53a302914a63da14b980991dac8f3014953134

  • Size

    92KB

  • Sample

    220212-d8444afeh3

  • MD5

    0a83265c93b91a16c5c52c2845b11d6a

  • SHA1

    e3c2de42c90ab1c192434b1bf70a30d1a7e5596e

  • SHA256

    16f88aa903b5852e640c8b007d53a302914a63da14b980991dac8f3014953134

  • SHA512

    ef99f8b7dc2bf6c070ab5012ee389cd52342348a23537632e337dde54f114ce0d766e7d8406a0bd5a59ff627fcfece9258241608a286d949715a923153ed31c4

Malware Config

Targets

    • Target

      16f88aa903b5852e640c8b007d53a302914a63da14b980991dac8f3014953134

    • Size

      92KB

    • MD5

      0a83265c93b91a16c5c52c2845b11d6a

    • SHA1

      e3c2de42c90ab1c192434b1bf70a30d1a7e5596e

    • SHA256

      16f88aa903b5852e640c8b007d53a302914a63da14b980991dac8f3014953134

    • SHA512

      ef99f8b7dc2bf6c070ab5012ee389cd52342348a23537632e337dde54f114ce0d766e7d8406a0bd5a59ff627fcfece9258241608a286d949715a923153ed31c4

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks