General

  • Target

    55e9f10a171e9d676157c5e53df3e7ed31995766bba1f2162b332e33b224f2dc

  • Size

    36KB

  • Sample

    230809-rtwfasde9w

  • MD5

    042c06a52b60145ee089ab26fa108a5e

  • SHA1

    a853e7c421c10b1106e30ab51a06a8a1ece1542a

  • SHA256

    55e9f10a171e9d676157c5e53df3e7ed31995766bba1f2162b332e33b224f2dc

  • SHA512

    c7d6e369d0705cc90b1b899e748432a5e20ece36c3f539d31f9ed0c750797f219dd9a848a96f5302fcff89d5e2873bb9023ae6ac919ae47ac56812ca605fbe50

  • SSDEEP

    768:TwbYGCv4nuEcJpQK4TQbtKvXwXgA9lJJea+yGCJQqeWnAEv2647DV:TwbYP4nuEApQK4TQbtY2gA9DX+ytBOP

Malware Config

Targets

    • Target

      55e9f10a171e9d676157c5e53df3e7ed31995766bba1f2162b332e33b224f2dc

    • Size

      36KB

    • MD5

      042c06a52b60145ee089ab26fa108a5e

    • SHA1

      a853e7c421c10b1106e30ab51a06a8a1ece1542a

    • SHA256

      55e9f10a171e9d676157c5e53df3e7ed31995766bba1f2162b332e33b224f2dc

    • SHA512

      c7d6e369d0705cc90b1b899e748432a5e20ece36c3f539d31f9ed0c750797f219dd9a848a96f5302fcff89d5e2873bb9023ae6ac919ae47ac56812ca605fbe50

    • SSDEEP

      768:TwbYGCv4nuEcJpQK4TQbtKvXwXgA9lJJea+yGCJQqeWnAEv2647DV:TwbYP4nuEApQK4TQbtY2gA9DX+ytBOP

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula payload

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Tasks