General

  • Target

    016cf53f99cc488796ed8ba9da14183a664b7ea19e283fc3ae193ecbb87ef46b

  • Size

    99KB

  • Sample

    220212-pm9y1accc8

  • MD5

    719db386f24aa872ab014afdc872c11f

  • SHA1

    d18c22043b009f59940dd3db8172b7ff6634513b

  • SHA256

    016cf53f99cc488796ed8ba9da14183a664b7ea19e283fc3ae193ecbb87ef46b

  • SHA512

    468af26f0c54e54686c4ef7d2af56fe52904756ba2a6b176963c97292317ecaa6023012fe096546c862767b243f3d35ad2845bc3d791d152cc1c7c811ecc0f1f

Malware Config

Targets

    • Target

      016cf53f99cc488796ed8ba9da14183a664b7ea19e283fc3ae193ecbb87ef46b

    • Size

      99KB

    • MD5

      719db386f24aa872ab014afdc872c11f

    • SHA1

      d18c22043b009f59940dd3db8172b7ff6634513b

    • SHA256

      016cf53f99cc488796ed8ba9da14183a664b7ea19e283fc3ae193ecbb87ef46b

    • SHA512

      468af26f0c54e54686c4ef7d2af56fe52904756ba2a6b176963c97292317ecaa6023012fe096546c862767b243f3d35ad2845bc3d791d152cc1c7c811ecc0f1f

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks