General

  • Target

    16559687aea98bc29b900ba4e9ec274a75b402cc81c7cbeb07f896a523858296

  • Size

    192KB

  • Sample

    220212-ekgvbshcen

  • MD5

    2421e9171c152b8657fcf6e9889e046a

  • SHA1

    a45599c6979543ffec32baea771d5c3d6a7453bf

  • SHA256

    16559687aea98bc29b900ba4e9ec274a75b402cc81c7cbeb07f896a523858296

  • SHA512

    ade7e6bfd35eb06281e3e41020fd1ee0c5ee4e5e2b228f157966bfecbb84de69d802e9973f3347efa956c3bc3855ac61316c5883f1090888a211b5aa5cdecc80

Malware Config

Targets

    • Target

      16559687aea98bc29b900ba4e9ec274a75b402cc81c7cbeb07f896a523858296

    • Size

      192KB

    • MD5

      2421e9171c152b8657fcf6e9889e046a

    • SHA1

      a45599c6979543ffec32baea771d5c3d6a7453bf

    • SHA256

      16559687aea98bc29b900ba4e9ec274a75b402cc81c7cbeb07f896a523858296

    • SHA512

      ade7e6bfd35eb06281e3e41020fd1ee0c5ee4e5e2b228f157966bfecbb84de69d802e9973f3347efa956c3bc3855ac61316c5883f1090888a211b5aa5cdecc80

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks