General

  • Target

    cd64145da6ddb5857039ef96ca9b47d0_JC.exe

  • Size

    42KB

  • Sample

    230913-wjyj5aea2y

  • MD5

    cd64145da6ddb5857039ef96ca9b47d0

  • SHA1

    75917fb5294498f70f1472aaafab27a892e3e614

  • SHA256

    4e64e96e5f49908f9bd44176dbdd2012e84bb6e7bde72af419ada7e8a17e303a

  • SHA512

    ae2a4586d7881811031e441b1ee62ee7a6bc6bbf1e86679c6ef5b695969e7426f7a6d3fff244a8e6cbcb50e31adf1e8ed76947123f898c79634f6df987329be2

  • SSDEEP

    768:/hSksandb4GgyMsp4hyYtoVxYGm1q+R9cFDBMm:/TsGpehyYtkYvYm9cHMm

Malware Config

Extracted

Family

sakula

C2

http://vpn.premrera.com:443/viewpre.asp?cstring=%s&tom=%d&id=%d

http://vpn.premrera.com:443/photo/%s.jpg?id=%d

http://173.254.226.212:443/viewpre.asp?cstring=%s&tom=%d&id=%d

http://173.254.226.212:443/photo/%s.jpg?id=%d

Targets

    • Target

      cd64145da6ddb5857039ef96ca9b47d0_JC.exe

    • Size

      42KB

    • MD5

      cd64145da6ddb5857039ef96ca9b47d0

    • SHA1

      75917fb5294498f70f1472aaafab27a892e3e614

    • SHA256

      4e64e96e5f49908f9bd44176dbdd2012e84bb6e7bde72af419ada7e8a17e303a

    • SHA512

      ae2a4586d7881811031e441b1ee62ee7a6bc6bbf1e86679c6ef5b695969e7426f7a6d3fff244a8e6cbcb50e31adf1e8ed76947123f898c79634f6df987329be2

    • SSDEEP

      768:/hSksandb4GgyMsp4hyYtoVxYGm1q+R9cFDBMm:/TsGpehyYtkYvYm9cHMm

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Discovery

Remote System Discovery

1
T1018

Tasks