General

  • Target

    17b5d02dfa302184fd757c4fa1aee9618fe1588cb107b88329c77dcfc4f4c1e0

  • Size

    36KB

  • Sample

    220212-dyfnrafdf7

  • MD5

    60060a45280a16bd9661f0f04588c943

  • SHA1

    dd5fc0e8e8f94a8fab0b8f9eb36fa7f29410329e

  • SHA256

    17b5d02dfa302184fd757c4fa1aee9618fe1588cb107b88329c77dcfc4f4c1e0

  • SHA512

    016696f80ec198d8a8e9ec849f8263511a70bc37834655c8ce075a2f3fe690194009c0f253113d642971ec24ed0941ecc771c0571e15ebd0cf67e3e8758ef85d

Malware Config

Targets

    • Target

      17b5d02dfa302184fd757c4fa1aee9618fe1588cb107b88329c77dcfc4f4c1e0

    • Size

      36KB

    • MD5

      60060a45280a16bd9661f0f04588c943

    • SHA1

      dd5fc0e8e8f94a8fab0b8f9eb36fa7f29410329e

    • SHA256

      17b5d02dfa302184fd757c4fa1aee9618fe1588cb107b88329c77dcfc4f4c1e0

    • SHA512

      016696f80ec198d8a8e9ec849f8263511a70bc37834655c8ce075a2f3fe690194009c0f253113d642971ec24ed0941ecc771c0571e15ebd0cf67e3e8758ef85d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks