General

  • Target

    160c02430cf7675b77bbe0b28bf01e2450b56bc2c3b31bfeb84cb340e23a894c

  • Size

    35KB

  • Sample

    220212-epaltahdam

  • MD5

    489b7be0f9014e64a4af451fd16a2356

  • SHA1

    c3569eefb95ca8588231e41194947c2c274365d6

  • SHA256

    160c02430cf7675b77bbe0b28bf01e2450b56bc2c3b31bfeb84cb340e23a894c

  • SHA512

    a777b67b9e3385a8ab0e32863f9ac3d22dda57cb7711e387014ab12b27fdfd80f70ec145e1501937d51a14c5a6487ba7034333f7067cffcd6efd992abcdf4c85

Malware Config

Targets

    • Target

      160c02430cf7675b77bbe0b28bf01e2450b56bc2c3b31bfeb84cb340e23a894c

    • Size

      35KB

    • MD5

      489b7be0f9014e64a4af451fd16a2356

    • SHA1

      c3569eefb95ca8588231e41194947c2c274365d6

    • SHA256

      160c02430cf7675b77bbe0b28bf01e2450b56bc2c3b31bfeb84cb340e23a894c

    • SHA512

      a777b67b9e3385a8ab0e32863f9ac3d22dda57cb7711e387014ab12b27fdfd80f70ec145e1501937d51a14c5a6487ba7034333f7067cffcd6efd992abcdf4c85

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks