General

  • Target

    2ef07ce90f51ca389de09aad08048225b28c74c09cbaf3aceccddd3e6b003672

  • Size

    220KB

  • Sample

    221018-a1aczaeafp

  • MD5

    c2ae8bc15021ce07686a8ef83f0287fc

  • SHA1

    8d91e452bc71470d1ce05d02169f256a68d1e876

  • SHA256

    2ef07ce90f51ca389de09aad08048225b28c74c09cbaf3aceccddd3e6b003672

  • SHA512

    9475ae6c840f7f12eacd81333b5f87b0fc5fdaf40f54dd9a968c6f08d7e5409f7f1fe174c92fbbba94e48e3d939a6df9ec1f134f0d5fc019d587fcde527edf83

  • SSDEEP

    3072:a29DkEGRQixVSjLaes5G30B6SHrMPK82S5EVVEdZHMoGo8uA0I6pVMybCFbRZ:a29qRfVSnfj30B+2S6ydMI8QVMgCFbRZ

Malware Config

Targets

    • Target

      2ef07ce90f51ca389de09aad08048225b28c74c09cbaf3aceccddd3e6b003672

    • Size

      220KB

    • MD5

      c2ae8bc15021ce07686a8ef83f0287fc

    • SHA1

      8d91e452bc71470d1ce05d02169f256a68d1e876

    • SHA256

      2ef07ce90f51ca389de09aad08048225b28c74c09cbaf3aceccddd3e6b003672

    • SHA512

      9475ae6c840f7f12eacd81333b5f87b0fc5fdaf40f54dd9a968c6f08d7e5409f7f1fe174c92fbbba94e48e3d939a6df9ec1f134f0d5fc019d587fcde527edf83

    • SSDEEP

      3072:a29DkEGRQixVSjLaes5G30B6SHrMPK82S5EVVEdZHMoGo8uA0I6pVMybCFbRZ:a29qRfVSnfj30B+2S6ydMI8QVMgCFbRZ

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks