General

  • Target

    16ec7df9f2512e0c3acbaaed26f9b19c3c5bc6b0998c24ff028e841a854ec5ee

  • Size

    36KB

  • Sample

    220212-d9yzgaffa5

  • MD5

    8005cdb1bf34e370a108d0d4a1ece2b3

  • SHA1

    58a8d91da2caf6dbf01bedd77db284524956851f

  • SHA256

    16ec7df9f2512e0c3acbaaed26f9b19c3c5bc6b0998c24ff028e841a854ec5ee

  • SHA512

    d7d15e6940deeb8fb3457bc7d5321a3536cb0afa30200306fb82a1363534612a781b28b413dea4ea43645085a9855f1d0db2c90a4d6c0d09a292be20bf94458e

Malware Config

Targets

    • Target

      16ec7df9f2512e0c3acbaaed26f9b19c3c5bc6b0998c24ff028e841a854ec5ee

    • Size

      36KB

    • MD5

      8005cdb1bf34e370a108d0d4a1ece2b3

    • SHA1

      58a8d91da2caf6dbf01bedd77db284524956851f

    • SHA256

      16ec7df9f2512e0c3acbaaed26f9b19c3c5bc6b0998c24ff028e841a854ec5ee

    • SHA512

      d7d15e6940deeb8fb3457bc7d5321a3536cb0afa30200306fb82a1363534612a781b28b413dea4ea43645085a9855f1d0db2c90a4d6c0d09a292be20bf94458e

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks