General

  • Target

    16c12e4498112e163766a81dd77db105461a866bad3c35cc8b120aedc6bdfb3e

  • Size

    150KB

  • Sample

    220212-ec33laffd4

  • MD5

    174b5a3d3fc62bc9c51aa9676ec22bf8

  • SHA1

    ccf17924d38e78374028d7a4584e00cf8da213ba

  • SHA256

    16c12e4498112e163766a81dd77db105461a866bad3c35cc8b120aedc6bdfb3e

  • SHA512

    c78022dac820f7c809c3e3e346281682654b148bec327a58e0cdaa463322ecc1d79b75504676891097563f36e6dabe427575325365c67f45669a88308180496d

Malware Config

Targets

    • Target

      16c12e4498112e163766a81dd77db105461a866bad3c35cc8b120aedc6bdfb3e

    • Size

      150KB

    • MD5

      174b5a3d3fc62bc9c51aa9676ec22bf8

    • SHA1

      ccf17924d38e78374028d7a4584e00cf8da213ba

    • SHA256

      16c12e4498112e163766a81dd77db105461a866bad3c35cc8b120aedc6bdfb3e

    • SHA512

      c78022dac820f7c809c3e3e346281682654b148bec327a58e0cdaa463322ecc1d79b75504676891097563f36e6dabe427575325365c67f45669a88308180496d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks