General

  • Target

    01e01993368fc49434b8412c2b71abc8ba06b4a52bff45360b624795a5694d18

  • Size

    104KB

  • Sample

    220212-phacksdhfm

  • MD5

    b5cff3f3a79af92a10456fd6c631b8b7

  • SHA1

    f66c1950e24653a98fbd8f71d7f6105b8ea062df

  • SHA256

    01e01993368fc49434b8412c2b71abc8ba06b4a52bff45360b624795a5694d18

  • SHA512

    e126e3f2659e3dc27803c0ff944df756d14f6ff7ba8733a74aee8175641b5b214a86ef100cde7cd0cc54926515904f51496074120eb254665338d5cf2ea4a404

Malware Config

Targets

    • Target

      01e01993368fc49434b8412c2b71abc8ba06b4a52bff45360b624795a5694d18

    • Size

      104KB

    • MD5

      b5cff3f3a79af92a10456fd6c631b8b7

    • SHA1

      f66c1950e24653a98fbd8f71d7f6105b8ea062df

    • SHA256

      01e01993368fc49434b8412c2b71abc8ba06b4a52bff45360b624795a5694d18

    • SHA512

      e126e3f2659e3dc27803c0ff944df756d14f6ff7ba8733a74aee8175641b5b214a86ef100cde7cd0cc54926515904f51496074120eb254665338d5cf2ea4a404

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks