General

  • Target

    16bfd54f5f3819448956fd6d21f186fffb1a10ac36107e53499af6ab0306c7c9

  • Size

    60KB

  • Sample

    220212-ec5w7ahbgj

  • MD5

    464432b288cdde34066b2dee27bec728

  • SHA1

    67cede8e9fd7445e05ad2b24654b666c50958b29

  • SHA256

    16bfd54f5f3819448956fd6d21f186fffb1a10ac36107e53499af6ab0306c7c9

  • SHA512

    ac28b555d78e6850a43d9333e3293d314ee148b095c52ad4f93e2af71c6d338b2eb1b23b67797fa62dbc4872c41d942aa25d802010e97f02aa2e9f173e86c5ef

Malware Config

Targets

    • Target

      16bfd54f5f3819448956fd6d21f186fffb1a10ac36107e53499af6ab0306c7c9

    • Size

      60KB

    • MD5

      464432b288cdde34066b2dee27bec728

    • SHA1

      67cede8e9fd7445e05ad2b24654b666c50958b29

    • SHA256

      16bfd54f5f3819448956fd6d21f186fffb1a10ac36107e53499af6ab0306c7c9

    • SHA512

      ac28b555d78e6850a43d9333e3293d314ee148b095c52ad4f93e2af71c6d338b2eb1b23b67797fa62dbc4872c41d942aa25d802010e97f02aa2e9f173e86c5ef

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks