General

  • Target

    16c5574d1a647ccaf0aaf7b16fd52c5a2df29297abfc58bce40423bef89a3fc0

  • Size

    60KB

  • Sample

    220212-ecwnhshbfq

  • MD5

    2dd6289b929f6aaa732dfdb74c53e018

  • SHA1

    6a844dd533d18eb32f81023fb85c76280d1fdbf3

  • SHA256

    16c5574d1a647ccaf0aaf7b16fd52c5a2df29297abfc58bce40423bef89a3fc0

  • SHA512

    36021fcc08191ce8e3ef8aa24055e34edd1df193bfb65774b91117c542af4bbf012e53acc3a8951b7d3baca9384602ef5d0ace4f00675648124b7fd574cc991b

Malware Config

Targets

    • Target

      16c5574d1a647ccaf0aaf7b16fd52c5a2df29297abfc58bce40423bef89a3fc0

    • Size

      60KB

    • MD5

      2dd6289b929f6aaa732dfdb74c53e018

    • SHA1

      6a844dd533d18eb32f81023fb85c76280d1fdbf3

    • SHA256

      16c5574d1a647ccaf0aaf7b16fd52c5a2df29297abfc58bce40423bef89a3fc0

    • SHA512

      36021fcc08191ce8e3ef8aa24055e34edd1df193bfb65774b91117c542af4bbf012e53acc3a8951b7d3baca9384602ef5d0ace4f00675648124b7fd574cc991b

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks