General

  • Target

    NEAS.0e38859ac856073a7cc3b8b0836b6d80_JC.exe

  • Size

    72KB

  • Sample

    231103-f7y8kacf61

  • MD5

    0e38859ac856073a7cc3b8b0836b6d80

  • SHA1

    f6ca31c6f1dc8eb06e45a7caeaa79e1542014e48

  • SHA256

    87f1a43195ed5c9737128c532c158ef7847dccb0f58852f6f99c4d6e48653402

  • SHA512

    5c61fe55d776c9a39b2a031ddf2bb72c0b718cfebc8fb1869af6f734e475579c6cb0345ffab8441f3e656e9cd2e7be5eb4136ec970f5216fb8a094a943b8c836

  • SSDEEP

    768:q7Xezc/T6Zp14hyYtoVxYF9mHfCBJTAIO3OtYVW6Qptwyp:G6zqhyYtkYW/CPnO3ajwyp

Malware Config

Extracted

Family

sakula

C2

http://www.we11point.com:443/view.asp?cookie=%s&type=%d&vid=%d

http://www.we11point.com:443/photo/%s.jpg?vid=%d

Targets

    • Target

      NEAS.0e38859ac856073a7cc3b8b0836b6d80_JC.exe

    • Size

      72KB

    • MD5

      0e38859ac856073a7cc3b8b0836b6d80

    • SHA1

      f6ca31c6f1dc8eb06e45a7caeaa79e1542014e48

    • SHA256

      87f1a43195ed5c9737128c532c158ef7847dccb0f58852f6f99c4d6e48653402

    • SHA512

      5c61fe55d776c9a39b2a031ddf2bb72c0b718cfebc8fb1869af6f734e475579c6cb0345ffab8441f3e656e9cd2e7be5eb4136ec970f5216fb8a094a943b8c836

    • SSDEEP

      768:q7Xezc/T6Zp14hyYtoVxYF9mHfCBJTAIO3OtYVW6Qptwyp:G6zqhyYtkYW/CPnO3ajwyp

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks