General

  • Target

    16b5e4744412bb62eb55844b467ba274841e3036b08ea3babbee3ff6ce6793b5

  • Size

    101KB

  • Sample

    220212-edlvpshbgq

  • MD5

    52e1c43d43f3ee14b9297931f2475a5c

  • SHA1

    17a493c61cd98bf273924282eb26044e479cac82

  • SHA256

    16b5e4744412bb62eb55844b467ba274841e3036b08ea3babbee3ff6ce6793b5

  • SHA512

    2ac63bffa7005af4e10bbdd63d1f2489bdbada816f145eda13a32e048dd77947a1ea83e115fc6da4956c7e00a550ce474c0ab5d0ebf68e5613e619cf84e45741

Malware Config

Targets

    • Target

      16b5e4744412bb62eb55844b467ba274841e3036b08ea3babbee3ff6ce6793b5

    • Size

      101KB

    • MD5

      52e1c43d43f3ee14b9297931f2475a5c

    • SHA1

      17a493c61cd98bf273924282eb26044e479cac82

    • SHA256

      16b5e4744412bb62eb55844b467ba274841e3036b08ea3babbee3ff6ce6793b5

    • SHA512

      2ac63bffa7005af4e10bbdd63d1f2489bdbada816f145eda13a32e048dd77947a1ea83e115fc6da4956c7e00a550ce474c0ab5d0ebf68e5613e619cf84e45741

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks