General

  • Target

    17bb963491cf5af3cc74f98dce840cef6a42c52c7f539cdce0226dae2af70dad

  • Size

    80KB

  • Sample

    220212-dx1brsghhq

  • MD5

    747a59903a177672af85b9212f7ae215

  • SHA1

    4c062a6743eaff3a17251330d619bcb8e68b9f98

  • SHA256

    17bb963491cf5af3cc74f98dce840cef6a42c52c7f539cdce0226dae2af70dad

  • SHA512

    56e17fe2adae2a1ad316855ab4f1ce7b7dc64b05e551bb4a0f36e1a54fdafd385d79b975d5cfabc8c927aed5fce959b6d545cb7a1d7108f6db84bc3751b28bba

Malware Config

Targets

    • Target

      17bb963491cf5af3cc74f98dce840cef6a42c52c7f539cdce0226dae2af70dad

    • Size

      80KB

    • MD5

      747a59903a177672af85b9212f7ae215

    • SHA1

      4c062a6743eaff3a17251330d619bcb8e68b9f98

    • SHA256

      17bb963491cf5af3cc74f98dce840cef6a42c52c7f539cdce0226dae2af70dad

    • SHA512

      56e17fe2adae2a1ad316855ab4f1ce7b7dc64b05e551bb4a0f36e1a54fdafd385d79b975d5cfabc8c927aed5fce959b6d545cb7a1d7108f6db84bc3751b28bba

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks