General

  • Target

    17796927a7cc1c7532e760970ced206403010821e09ebccde5382fbe47052f42

  • Size

    60KB

  • Sample

    220212-d2q9nahaej

  • MD5

    2a0b0fc0d3280338e7b3df79d0bac6db

  • SHA1

    67a64ca1307574752fd6fd4b7b30d5742d4948f3

  • SHA256

    17796927a7cc1c7532e760970ced206403010821e09ebccde5382fbe47052f42

  • SHA512

    b674ad5ed61f60328f8840d3c7b56d295fbfaf1690e9f5a81f1d7c26220fc83d429acebf4225c3cf5677f26e25e63fa61706946c2b362a8c5fc200ecaef49b74

Malware Config

Targets

    • Target

      17796927a7cc1c7532e760970ced206403010821e09ebccde5382fbe47052f42

    • Size

      60KB

    • MD5

      2a0b0fc0d3280338e7b3df79d0bac6db

    • SHA1

      67a64ca1307574752fd6fd4b7b30d5742d4948f3

    • SHA256

      17796927a7cc1c7532e760970ced206403010821e09ebccde5382fbe47052f42

    • SHA512

      b674ad5ed61f60328f8840d3c7b56d295fbfaf1690e9f5a81f1d7c26220fc83d429acebf4225c3cf5677f26e25e63fa61706946c2b362a8c5fc200ecaef49b74

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks