General

  • Target

    16b8c2d1ef1b3419c475712f6eb3c0f5eb65b79d79932e78ed3229f71f3e4ef0

  • Size

    99KB

  • Sample

    220212-edd5vshbgp

  • MD5

    f4d18e0e1552182baaaaa032e247bf68

  • SHA1

    61bc650c3db23543518eff5fd3548013f3445035

  • SHA256

    16b8c2d1ef1b3419c475712f6eb3c0f5eb65b79d79932e78ed3229f71f3e4ef0

  • SHA512

    8bde9d27fe31068ac763610f80ff038a2f48859b56a96c2b3ae94ee51bcfa8c63279744e386c436ab4ba69b9007b97e73a2576750df6c1d4aa05cae5de067883

Malware Config

Targets

    • Target

      16b8c2d1ef1b3419c475712f6eb3c0f5eb65b79d79932e78ed3229f71f3e4ef0

    • Size

      99KB

    • MD5

      f4d18e0e1552182baaaaa032e247bf68

    • SHA1

      61bc650c3db23543518eff5fd3548013f3445035

    • SHA256

      16b8c2d1ef1b3419c475712f6eb3c0f5eb65b79d79932e78ed3229f71f3e4ef0

    • SHA512

      8bde9d27fe31068ac763610f80ff038a2f48859b56a96c2b3ae94ee51bcfa8c63279744e386c436ab4ba69b9007b97e73a2576750df6c1d4aa05cae5de067883

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks