General

  • Target

    172e885af7d6219027d365551308ce5ba624769ad266ef99e354a48d049f4f40

  • Size

    191KB

  • Sample

    220212-d6d5wshahk

  • MD5

    25f558e59c64d3cc66a9c212eae07cf0

  • SHA1

    9db3e6f1788238f9a115fac923ffbe40d7b79265

  • SHA256

    172e885af7d6219027d365551308ce5ba624769ad266ef99e354a48d049f4f40

  • SHA512

    d7f21c96b76628be72128657f0ce0f536923086e51c6c5834c2c0cf9398a7892ec42981c7cf9c3cd344d0b3480aee6701d07b62ab338b854c42dc7be1e60b371

Malware Config

Targets

    • Target

      172e885af7d6219027d365551308ce5ba624769ad266ef99e354a48d049f4f40

    • Size

      191KB

    • MD5

      25f558e59c64d3cc66a9c212eae07cf0

    • SHA1

      9db3e6f1788238f9a115fac923ffbe40d7b79265

    • SHA256

      172e885af7d6219027d365551308ce5ba624769ad266ef99e354a48d049f4f40

    • SHA512

      d7f21c96b76628be72128657f0ce0f536923086e51c6c5834c2c0cf9398a7892ec42981c7cf9c3cd344d0b3480aee6701d07b62ab338b854c42dc7be1e60b371

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks