General

  • Target

    17278954cd9da6e8c4eb649421d0f26c264420edab92e776c926a6e261874ca9

  • Size

    192KB

  • Sample

    220212-d6xx1ahahq

  • MD5

    789e42f7125b953b72f9aa98a6b87b0d

  • SHA1

    3dbb5a234018849ab18074e1facaadde13d036c9

  • SHA256

    17278954cd9da6e8c4eb649421d0f26c264420edab92e776c926a6e261874ca9

  • SHA512

    e9c60a9d0bf545537149b17da17fc171d1ae9192623f1f5e7c1ce2193728af588fe4fc08145a4442c32e8e602f0162613c0cd4b851ee44ec1fbf8aedf9ea3441

Malware Config

Targets

    • Target

      17278954cd9da6e8c4eb649421d0f26c264420edab92e776c926a6e261874ca9

    • Size

      192KB

    • MD5

      789e42f7125b953b72f9aa98a6b87b0d

    • SHA1

      3dbb5a234018849ab18074e1facaadde13d036c9

    • SHA256

      17278954cd9da6e8c4eb649421d0f26c264420edab92e776c926a6e261874ca9

    • SHA512

      e9c60a9d0bf545537149b17da17fc171d1ae9192623f1f5e7c1ce2193728af588fe4fc08145a4442c32e8e602f0162613c0cd4b851ee44ec1fbf8aedf9ea3441

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks