General

  • Target

    0169dc6ba864b303cac9cf3bdd9b73c3ed623886394aa380d3da00223140f301

  • Size

    58KB

  • Sample

    220212-pnk19sccd3

  • MD5

    fa876c5b3776604bf261ffedf19b6a87

  • SHA1

    c9d9229c1846303910ce86ded66a3547039d58de

  • SHA256

    0169dc6ba864b303cac9cf3bdd9b73c3ed623886394aa380d3da00223140f301

  • SHA512

    112bdf4e8fbaa5ba6aa92a12cee841ab0a9c00fbd6afc94dac4f92ad2b40b20b6787ef7e5dcd61fcaa8cf6af7508b9a9139df467f8b801e542ddc435cb643483

Malware Config

Targets

    • Target

      0169dc6ba864b303cac9cf3bdd9b73c3ed623886394aa380d3da00223140f301

    • Size

      58KB

    • MD5

      fa876c5b3776604bf261ffedf19b6a87

    • SHA1

      c9d9229c1846303910ce86ded66a3547039d58de

    • SHA256

      0169dc6ba864b303cac9cf3bdd9b73c3ed623886394aa380d3da00223140f301

    • SHA512

      112bdf4e8fbaa5ba6aa92a12cee841ab0a9c00fbd6afc94dac4f92ad2b40b20b6787ef7e5dcd61fcaa8cf6af7508b9a9139df467f8b801e542ddc435cb643483

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks