General

  • Target

    16b31b35cc7156fddf967745472e1ceba2458d5cdab702a0ac2e3d7611f71be7

  • Size

    150KB

  • Sample

    220212-edx8qsffd8

  • MD5

    0ca32644c4e8bc7a25374cc7fc875f1d

  • SHA1

    2d077944cddc797f71767b5aae2857239ca717c2

  • SHA256

    16b31b35cc7156fddf967745472e1ceba2458d5cdab702a0ac2e3d7611f71be7

  • SHA512

    f606ccd20f60cac55d0c7eb14e7d7adab2c2e04fa5bd764f1468c3f75693545441945f08c1840cd8be4701b297d48b76fbeebbfca329eb4cce4341b6d133eb1e

Malware Config

Targets

    • Target

      16b31b35cc7156fddf967745472e1ceba2458d5cdab702a0ac2e3d7611f71be7

    • Size

      150KB

    • MD5

      0ca32644c4e8bc7a25374cc7fc875f1d

    • SHA1

      2d077944cddc797f71767b5aae2857239ca717c2

    • SHA256

      16b31b35cc7156fddf967745472e1ceba2458d5cdab702a0ac2e3d7611f71be7

    • SHA512

      f606ccd20f60cac55d0c7eb14e7d7adab2c2e04fa5bd764f1468c3f75693545441945f08c1840cd8be4701b297d48b76fbeebbfca329eb4cce4341b6d133eb1e

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks