General

  • Target

    17c1a21113193dd1e593c4634eb1a65f219ee454f3b0ccdad6fae0f084a0d713

  • Size

    58KB

  • Sample

    220212-dxlhlsghhm

  • MD5

    de8dd4a22922c31dcf93f862eca7abe4

  • SHA1

    be3eb550dd83d99085f21f04b0dd33f0cb4c575e

  • SHA256

    17c1a21113193dd1e593c4634eb1a65f219ee454f3b0ccdad6fae0f084a0d713

  • SHA512

    5224bf7c204dbb30a9f3565596a3d6cedd621d3ceb43f8b057dd5d6ed46b48b607820f4a7fce27291137092b9542bd691fc148a4ad15bd59cbe48eb5d10203fc

Malware Config

Targets

    • Target

      17c1a21113193dd1e593c4634eb1a65f219ee454f3b0ccdad6fae0f084a0d713

    • Size

      58KB

    • MD5

      de8dd4a22922c31dcf93f862eca7abe4

    • SHA1

      be3eb550dd83d99085f21f04b0dd33f0cb4c575e

    • SHA256

      17c1a21113193dd1e593c4634eb1a65f219ee454f3b0ccdad6fae0f084a0d713

    • SHA512

      5224bf7c204dbb30a9f3565596a3d6cedd621d3ceb43f8b057dd5d6ed46b48b607820f4a7fce27291137092b9542bd691fc148a4ad15bd59cbe48eb5d10203fc

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks