General

  • Target

    16cfa376944784cbd7872a3ca2a376678093d7e8a1e44b7636c03f8b2a142362

  • Size

    35KB

  • Sample

    220212-eb17lshber

  • MD5

    c400445fe6d48c9d7a80305f3ee48b80

  • SHA1

    a5360642a4704964f69bbf7adc6f32c136b4605e

  • SHA256

    16cfa376944784cbd7872a3ca2a376678093d7e8a1e44b7636c03f8b2a142362

  • SHA512

    d4860d4cdff7964e120a8ce11ddaae60b02640a3c6ae2bf12e137cb91e5c751fe062490dec3b3a2406ee1058b26df4334aa4746fbcd1dfd4e8746171ed712281

Malware Config

Targets

    • Target

      16cfa376944784cbd7872a3ca2a376678093d7e8a1e44b7636c03f8b2a142362

    • Size

      35KB

    • MD5

      c400445fe6d48c9d7a80305f3ee48b80

    • SHA1

      a5360642a4704964f69bbf7adc6f32c136b4605e

    • SHA256

      16cfa376944784cbd7872a3ca2a376678093d7e8a1e44b7636c03f8b2a142362

    • SHA512

      d4860d4cdff7964e120a8ce11ddaae60b02640a3c6ae2bf12e137cb91e5c751fe062490dec3b3a2406ee1058b26df4334aa4746fbcd1dfd4e8746171ed712281

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks