General

  • Target

    NEAS.c53c187207cfd2fbf3990f28f3dae710.exe

  • Size

    100KB

  • Sample

    231102-vbraeacg75

  • MD5

    c53c187207cfd2fbf3990f28f3dae710

  • SHA1

    134862ee445c827fcea3514210e064ba120ff069

  • SHA256

    27e86a6f2d8349cf8f34a1807a1d56be898cd3ed224d3451ca46f9fa5b0b0c0a

  • SHA512

    2cfd97e6e2ca9b0b3b0d736daeb9a8edd3d695c28451a91592f93c255bd3d83f5908cbf06f699ba7a5566d3121ca81e5a8f925b120a39cc336081e582232e618

  • SSDEEP

    1536:Loaj1hJL1S9t0MIeboal8bCKxo7h0RPaaml0Nz30rtrsxw:c0hpgz6xGhZamyF30Boxw

Malware Config

Targets

    • Target

      NEAS.c53c187207cfd2fbf3990f28f3dae710.exe

    • Size

      100KB

    • MD5

      c53c187207cfd2fbf3990f28f3dae710

    • SHA1

      134862ee445c827fcea3514210e064ba120ff069

    • SHA256

      27e86a6f2d8349cf8f34a1807a1d56be898cd3ed224d3451ca46f9fa5b0b0c0a

    • SHA512

      2cfd97e6e2ca9b0b3b0d736daeb9a8edd3d695c28451a91592f93c255bd3d83f5908cbf06f699ba7a5566d3121ca81e5a8f925b120a39cc336081e582232e618

    • SSDEEP

      1536:Loaj1hJL1S9t0MIeboal8bCKxo7h0RPaaml0Nz30rtrsxw:c0hpgz6xGhZamyF30Boxw

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks