General

  • Target

    17f685852cc584d950834ce09b56cac5293856f19ddf55ae958a383b9588df43

  • Size

    35KB

  • Sample

    220212-dvex2sfdc5

  • MD5

    2079e6d43e8c8196de30931891230d2e

  • SHA1

    b27f6fed23701d4d06e49839602a1e962561ac2c

  • SHA256

    17f685852cc584d950834ce09b56cac5293856f19ddf55ae958a383b9588df43

  • SHA512

    b0e0b72456eea4f2c2e58c82bd1e8a490a91edd506b8643a889644e668d0599695e81c10babf4efaadf4a1a28d54ad34d2b1c5fbcb32dd9b9f4fcc17c2577075

Malware Config

Targets

    • Target

      17f685852cc584d950834ce09b56cac5293856f19ddf55ae958a383b9588df43

    • Size

      35KB

    • MD5

      2079e6d43e8c8196de30931891230d2e

    • SHA1

      b27f6fed23701d4d06e49839602a1e962561ac2c

    • SHA256

      17f685852cc584d950834ce09b56cac5293856f19ddf55ae958a383b9588df43

    • SHA512

      b0e0b72456eea4f2c2e58c82bd1e8a490a91edd506b8643a889644e668d0599695e81c10babf4efaadf4a1a28d54ad34d2b1c5fbcb32dd9b9f4fcc17c2577075

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks