General

  • Target

    16b5be27a16e8813e3fadff12d9b879616f3b56acca17861985402a49133712f

  • Size

    99KB

  • Sample

    220212-ednpashbgr

  • MD5

    9d27254d246971710ace0787b214046a

  • SHA1

    1798d5de0d4ebd23857ce1f808a660c2b4bfe022

  • SHA256

    16b5be27a16e8813e3fadff12d9b879616f3b56acca17861985402a49133712f

  • SHA512

    09f6d1b043d592bfaa678c09c2221446d4232b88911af29f44356c46d7a023410c86c1024fb7663d056c79bde458601b01e1a0eae12400360b9ad0d1708f1953

Malware Config

Targets

    • Target

      16b5be27a16e8813e3fadff12d9b879616f3b56acca17861985402a49133712f

    • Size

      99KB

    • MD5

      9d27254d246971710ace0787b214046a

    • SHA1

      1798d5de0d4ebd23857ce1f808a660c2b4bfe022

    • SHA256

      16b5be27a16e8813e3fadff12d9b879616f3b56acca17861985402a49133712f

    • SHA512

      09f6d1b043d592bfaa678c09c2221446d4232b88911af29f44356c46d7a023410c86c1024fb7663d056c79bde458601b01e1a0eae12400360b9ad0d1708f1953

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks