General

  • Target

    NEAS.be376371771bb547c306eafc3fe4ec40.exe

  • Size

    37KB

  • Sample

    231022-v1ctbaac49

  • MD5

    be376371771bb547c306eafc3fe4ec40

  • SHA1

    7f267f8f4b910417aea6f1b370c51c4dee644195

  • SHA256

    d9c2a44499d7ee91fe6d7270caee934acf961164eaba250ba0b700b788d36128

  • SHA512

    8ed2270b831d8df4483399e94117d2b056eaac30b8283bab0cd66023b7934c7eed0d32487402e37b7485b9a95e682ded1892c72e96cef590f27ce71afc3bc0c7

  • SSDEEP

    768:D7Xezc/T6Zp14hyYtoVxYF9mH8VQ1PcPW/M9z9:n6zqhyYtkYWRPTEz9

Malware Config

Extracted

Family

sakula

C2

http://www.we11point.com:443/view.asp?cookie=%s&type=%d&vid=%d

http://www.we11point.com:443/photo/%s.jpg?vid=%d

Targets

    • Target

      NEAS.be376371771bb547c306eafc3fe4ec40.exe

    • Size

      37KB

    • MD5

      be376371771bb547c306eafc3fe4ec40

    • SHA1

      7f267f8f4b910417aea6f1b370c51c4dee644195

    • SHA256

      d9c2a44499d7ee91fe6d7270caee934acf961164eaba250ba0b700b788d36128

    • SHA512

      8ed2270b831d8df4483399e94117d2b056eaac30b8283bab0cd66023b7934c7eed0d32487402e37b7485b9a95e682ded1892c72e96cef590f27ce71afc3bc0c7

    • SSDEEP

      768:D7Xezc/T6Zp14hyYtoVxYF9mH8VQ1PcPW/M9z9:n6zqhyYtkYWRPTEz9

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks