General

  • Target

    17352faa445e72a2b4d612697b199d00dcc7ad38907198d5429f04ce89003bfe

  • Size

    58KB

  • Sample

    220212-d57e2sfee3

  • MD5

    b6efb61967e236df483520419b00eb01

  • SHA1

    40f15fc563d40d0210e249bd1297b37ad1c19db7

  • SHA256

    17352faa445e72a2b4d612697b199d00dcc7ad38907198d5429f04ce89003bfe

  • SHA512

    6ab83e9fc500d87d71b6ecc2dfe1094efc993511c506be6b8992466a6e9e7a3a5660b5143c7c966d44125803955a052b5b064cc04946ce26f694866b6e804ea6

Malware Config

Targets

    • Target

      17352faa445e72a2b4d612697b199d00dcc7ad38907198d5429f04ce89003bfe

    • Size

      58KB

    • MD5

      b6efb61967e236df483520419b00eb01

    • SHA1

      40f15fc563d40d0210e249bd1297b37ad1c19db7

    • SHA256

      17352faa445e72a2b4d612697b199d00dcc7ad38907198d5429f04ce89003bfe

    • SHA512

      6ab83e9fc500d87d71b6ecc2dfe1094efc993511c506be6b8992466a6e9e7a3a5660b5143c7c966d44125803955a052b5b064cc04946ce26f694866b6e804ea6

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks