General

  • Target

    16f5137402119fce465593db8a66e8b9d1497650f396c4d89a2e6bfd1c0f250a

  • Size

    36KB

  • Sample

    220212-d9c21afeh6

  • MD5

    3aaf6e82cf40e39ea037d5b4f906d546

  • SHA1

    a98b9a3ae5814cbad8365f6eb5637ba0526f6f45

  • SHA256

    16f5137402119fce465593db8a66e8b9d1497650f396c4d89a2e6bfd1c0f250a

  • SHA512

    c2459c9519354f3d9c8770beaeb45fa19c8627b533f8f9f3ba64613a8db58241656ca44d0af284ad9d7cf656a70877c2086bc615553278458195e7e24fbe42b8

Malware Config

Targets

    • Target

      16f5137402119fce465593db8a66e8b9d1497650f396c4d89a2e6bfd1c0f250a

    • Size

      36KB

    • MD5

      3aaf6e82cf40e39ea037d5b4f906d546

    • SHA1

      a98b9a3ae5814cbad8365f6eb5637ba0526f6f45

    • SHA256

      16f5137402119fce465593db8a66e8b9d1497650f396c4d89a2e6bfd1c0f250a

    • SHA512

      c2459c9519354f3d9c8770beaeb45fa19c8627b533f8f9f3ba64613a8db58241656ca44d0af284ad9d7cf656a70877c2086bc615553278458195e7e24fbe42b8

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks