General

  • Target

    160d94f00f6fadffc95d29b42f9c52e5c2b2ca660ec2179109e0377240861836

  • Size

    184KB

  • Sample

    220212-en6mvsfgf8

  • MD5

    ac57a33099ed8d5c57bd46e96b7c9313

  • SHA1

    1e3f5e5c31bcb9d1d7630d2ac4b0270b0688c660

  • SHA256

    160d94f00f6fadffc95d29b42f9c52e5c2b2ca660ec2179109e0377240861836

  • SHA512

    5018338463bad52c8b8c383af92dac52e1e5a8cd30adf62978c6e020ebddf8f2377892285996bdb03984ea6293b0baf0392777aa0dac2396b15c4aec1b83714a

Malware Config

Targets

    • Target

      160d94f00f6fadffc95d29b42f9c52e5c2b2ca660ec2179109e0377240861836

    • Size

      184KB

    • MD5

      ac57a33099ed8d5c57bd46e96b7c9313

    • SHA1

      1e3f5e5c31bcb9d1d7630d2ac4b0270b0688c660

    • SHA256

      160d94f00f6fadffc95d29b42f9c52e5c2b2ca660ec2179109e0377240861836

    • SHA512

      5018338463bad52c8b8c383af92dac52e1e5a8cd30adf62978c6e020ebddf8f2377892285996bdb03984ea6293b0baf0392777aa0dac2396b15c4aec1b83714a

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks