General

  • Target

    17cb378c175423e7bb5c547feafa9d53f500bd63efb9df33888fd18ca4963f5c

  • Size

    60KB

  • Sample

    220212-dwqe6sghgn

  • MD5

    a1c219035f2f2b1444647a98b172e0b1

  • SHA1

    aed26663dddae14ead3907995877f6d8ed4d0966

  • SHA256

    17cb378c175423e7bb5c547feafa9d53f500bd63efb9df33888fd18ca4963f5c

  • SHA512

    82ff5d7c97c715e7b44fd67f937aadb13ab777cb2b3826827e19100461547b1fb2a6d659f88cad8848fa29be95914d75e605e1f62bd3a25dd4fedfaa90b96ad7

Malware Config

Targets

    • Target

      17cb378c175423e7bb5c547feafa9d53f500bd63efb9df33888fd18ca4963f5c

    • Size

      60KB

    • MD5

      a1c219035f2f2b1444647a98b172e0b1

    • SHA1

      aed26663dddae14ead3907995877f6d8ed4d0966

    • SHA256

      17cb378c175423e7bb5c547feafa9d53f500bd63efb9df33888fd18ca4963f5c

    • SHA512

      82ff5d7c97c715e7b44fd67f937aadb13ab777cb2b3826827e19100461547b1fb2a6d659f88cad8848fa29be95914d75e605e1f62bd3a25dd4fedfaa90b96ad7

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks