General

  • Target

    172ecc1273f2b40669c29a3f3defb715c1b61b7463a104888fa4906f7be137ec

  • Size

    184KB

  • Sample

    220212-d6b1jafee4

  • MD5

    35b1d729348192d9d83ac9cfa4614903

  • SHA1

    19434549497f439712be01468f9689ef1cccac4f

  • SHA256

    172ecc1273f2b40669c29a3f3defb715c1b61b7463a104888fa4906f7be137ec

  • SHA512

    3e6121c1489c83f4977e68cee4ff6d69a66a4a5edd318b7a0740300a4f71e02e103034651234a26896ff2620b881b689627727123a2e11de3f9716500cbd6e8f

Malware Config

Targets

    • Target

      172ecc1273f2b40669c29a3f3defb715c1b61b7463a104888fa4906f7be137ec

    • Size

      184KB

    • MD5

      35b1d729348192d9d83ac9cfa4614903

    • SHA1

      19434549497f439712be01468f9689ef1cccac4f

    • SHA256

      172ecc1273f2b40669c29a3f3defb715c1b61b7463a104888fa4906f7be137ec

    • SHA512

      3e6121c1489c83f4977e68cee4ff6d69a66a4a5edd318b7a0740300a4f71e02e103034651234a26896ff2620b881b689627727123a2e11de3f9716500cbd6e8f

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks