General

  • Target

    16841d3402fbe75bb1e62fd90833870f665109a708595e4ceb1e063e6d7a9db9

  • Size

    216KB

  • Sample

    220212-eggedsffg9

  • MD5

    093ed7ab42a69c53731f426e834cee29

  • SHA1

    4cef0ff90c7aa471e0b1acc9f06fa2a29fa7ea28

  • SHA256

    16841d3402fbe75bb1e62fd90833870f665109a708595e4ceb1e063e6d7a9db9

  • SHA512

    18ced17e41caba08bbf5565b49ddc039dc19b27c45423eba3832068d6695b8ef49b775940a658fabd54a1e7a422ad493c5f20fcdd7ff741af3f0ce7bfa9c91b2

Malware Config

Targets

    • Target

      16841d3402fbe75bb1e62fd90833870f665109a708595e4ceb1e063e6d7a9db9

    • Size

      216KB

    • MD5

      093ed7ab42a69c53731f426e834cee29

    • SHA1

      4cef0ff90c7aa471e0b1acc9f06fa2a29fa7ea28

    • SHA256

      16841d3402fbe75bb1e62fd90833870f665109a708595e4ceb1e063e6d7a9db9

    • SHA512

      18ced17e41caba08bbf5565b49ddc039dc19b27c45423eba3832068d6695b8ef49b775940a658fabd54a1e7a422ad493c5f20fcdd7ff741af3f0ce7bfa9c91b2

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks