General

  • Target

    17b9b9d52a094ec9568c661664e18f8efc6b4cfce8e448d2afa42100a78038ee

  • Size

    92KB

  • Sample

    220212-dx26csfdf2

  • MD5

    654af90c1ccaba040bc0407518f01e01

  • SHA1

    393b99f27dc3484203808cfed8ee06824454802d

  • SHA256

    17b9b9d52a094ec9568c661664e18f8efc6b4cfce8e448d2afa42100a78038ee

  • SHA512

    1b7e295e44de8d6ccb2be435af153ce0d95ddd2b45df1f60a3ef2a8af28111c433051370f7a5299e4c942748f3b0dfe3e84120fdc1b09c1f749e5648c7fae4db

Malware Config

Targets

    • Target

      17b9b9d52a094ec9568c661664e18f8efc6b4cfce8e448d2afa42100a78038ee

    • Size

      92KB

    • MD5

      654af90c1ccaba040bc0407518f01e01

    • SHA1

      393b99f27dc3484203808cfed8ee06824454802d

    • SHA256

      17b9b9d52a094ec9568c661664e18f8efc6b4cfce8e448d2afa42100a78038ee

    • SHA512

      1b7e295e44de8d6ccb2be435af153ce0d95ddd2b45df1f60a3ef2a8af28111c433051370f7a5299e4c942748f3b0dfe3e84120fdc1b09c1f749e5648c7fae4db

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks