General

  • Target

    17a1c43ad76f9ab0ae009611562400157682386396cef8fc4bacdbb13a6e0554

  • Size

    216KB

  • Sample

    220212-dzdksafdg4

  • MD5

    dc8c50b6baa94c09602f1e011573b1dc

  • SHA1

    95e513cf79b0c726e27afcfab09364b53bc42e90

  • SHA256

    17a1c43ad76f9ab0ae009611562400157682386396cef8fc4bacdbb13a6e0554

  • SHA512

    f27dd8d2609c240739b16b43bcfa8a2a0ce07674061f4b075dd7e1a0c2e8945c37e5e925b0e5de5a74b9b96bcb1ddefa7b17cf808be2beb057079a569348b513

Malware Config

Targets

    • Target

      17a1c43ad76f9ab0ae009611562400157682386396cef8fc4bacdbb13a6e0554

    • Size

      216KB

    • MD5

      dc8c50b6baa94c09602f1e011573b1dc

    • SHA1

      95e513cf79b0c726e27afcfab09364b53bc42e90

    • SHA256

      17a1c43ad76f9ab0ae009611562400157682386396cef8fc4bacdbb13a6e0554

    • SHA512

      f27dd8d2609c240739b16b43bcfa8a2a0ce07674061f4b075dd7e1a0c2e8945c37e5e925b0e5de5a74b9b96bcb1ddefa7b17cf808be2beb057079a569348b513

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks