General

  • Target

    17e8fbfe88fd32ee87bcdf88271482b36b70038fd966fa27fab4d1bc4766599b

  • Size

    79KB

  • Sample

    220212-dvwkssfdc8

  • MD5

    379ab70d01e95dabf8edd08528319627

  • SHA1

    f5a8287f44018f9b860097085b0e915d5b36532a

  • SHA256

    17e8fbfe88fd32ee87bcdf88271482b36b70038fd966fa27fab4d1bc4766599b

  • SHA512

    5186e74a8718a05562b6f0c35ab231e89f1dc6969db8d6d493afb805b38a358a1ce8208a94dec7f18be6d6940d032dda8e476cd79c485359df0ee4ea7b85c6a4

Malware Config

Targets

    • Target

      17e8fbfe88fd32ee87bcdf88271482b36b70038fd966fa27fab4d1bc4766599b

    • Size

      79KB

    • MD5

      379ab70d01e95dabf8edd08528319627

    • SHA1

      f5a8287f44018f9b860097085b0e915d5b36532a

    • SHA256

      17e8fbfe88fd32ee87bcdf88271482b36b70038fd966fa27fab4d1bc4766599b

    • SHA512

      5186e74a8718a05562b6f0c35ab231e89f1dc6969db8d6d493afb805b38a358a1ce8208a94dec7f18be6d6940d032dda8e476cd79c485359df0ee4ea7b85c6a4

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks