General

  • Target

    17b53e453a8a8860d8df10bc893ce75e1e1bb7e644b4dbc007148c9fc1730743

  • Size

    36KB

  • Sample

    220212-dykygahaal

  • MD5

    dee166336b7c538a166d6ea633cf02a1

  • SHA1

    a2ac485c77626ab73152dc4435485c62a0fbc946

  • SHA256

    17b53e453a8a8860d8df10bc893ce75e1e1bb7e644b4dbc007148c9fc1730743

  • SHA512

    a27b6516e28ee8227bdae2aa74584b8198cbb4b7afeedd2a19913720187fa0429751b245161951800c0f873f229682a50c8d45710331e5659c5cb0666c16dba0

Malware Config

Targets

    • Target

      17b53e453a8a8860d8df10bc893ce75e1e1bb7e644b4dbc007148c9fc1730743

    • Size

      36KB

    • MD5

      dee166336b7c538a166d6ea633cf02a1

    • SHA1

      a2ac485c77626ab73152dc4435485c62a0fbc946

    • SHA256

      17b53e453a8a8860d8df10bc893ce75e1e1bb7e644b4dbc007148c9fc1730743

    • SHA512

      a27b6516e28ee8227bdae2aa74584b8198cbb4b7afeedd2a19913720187fa0429751b245161951800c0f873f229682a50c8d45710331e5659c5cb0666c16dba0

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks