General

  • Target

    16a8ed2dea69d4670608e6963e668235dcac95c6a68dcbf093b5d65a37bdd01b

  • Size

    92KB

  • Sample

    220212-eeqkaaffe8

  • MD5

    22ffa7699d3f7ebbf2b406bf781e42c0

  • SHA1

    73b45227e114739656a33775533eee95e43c0a1d

  • SHA256

    16a8ed2dea69d4670608e6963e668235dcac95c6a68dcbf093b5d65a37bdd01b

  • SHA512

    38b4026a485a0adc5206e1bf1adfea34ed0ec2ea6aafb0d4702245963d4e1044250433ef6c2d696bdcb5c2d3caf2ef1ad52ebbe267441a98ac9be3ab21bfb3ae

Malware Config

Targets

    • Target

      16a8ed2dea69d4670608e6963e668235dcac95c6a68dcbf093b5d65a37bdd01b

    • Size

      92KB

    • MD5

      22ffa7699d3f7ebbf2b406bf781e42c0

    • SHA1

      73b45227e114739656a33775533eee95e43c0a1d

    • SHA256

      16a8ed2dea69d4670608e6963e668235dcac95c6a68dcbf093b5d65a37bdd01b

    • SHA512

      38b4026a485a0adc5206e1bf1adfea34ed0ec2ea6aafb0d4702245963d4e1044250433ef6c2d696bdcb5c2d3caf2ef1ad52ebbe267441a98ac9be3ab21bfb3ae

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks