General

  • Target

    17602648a73c06f1a7c5bf221bc1918895e37c5482145769730c00e844a3b36e

  • Size

    99KB

  • Sample

    220212-d386vsfec4

  • MD5

    3179e810b10b9739acd89ff0515b8b26

  • SHA1

    3c52c1cffd144a7877953f990d2f4a01a7e27eb0

  • SHA256

    17602648a73c06f1a7c5bf221bc1918895e37c5482145769730c00e844a3b36e

  • SHA512

    69be08db3498836ca9c4ab53a058fa6be0fabd450efcecd5f3c4d7562f992c4a426fc785b0c6ed52626bf0926da92495f6def7bac7661e7e8dcd3d91870472c2

Malware Config

Targets

    • Target

      17602648a73c06f1a7c5bf221bc1918895e37c5482145769730c00e844a3b36e

    • Size

      99KB

    • MD5

      3179e810b10b9739acd89ff0515b8b26

    • SHA1

      3c52c1cffd144a7877953f990d2f4a01a7e27eb0

    • SHA256

      17602648a73c06f1a7c5bf221bc1918895e37c5482145769730c00e844a3b36e

    • SHA512

      69be08db3498836ca9c4ab53a058fa6be0fabd450efcecd5f3c4d7562f992c4a426fc785b0c6ed52626bf0926da92495f6def7bac7661e7e8dcd3d91870472c2

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks