General

  • Target

    NEAS.b1cd4f746c4e24af485938411c8b5940_JC.exe

  • Size

    40KB

  • Sample

    231103-x1xvlaha6v

  • MD5

    b1cd4f746c4e24af485938411c8b5940

  • SHA1

    fe1e3045c3c8100675afdc2f92b709398fa91697

  • SHA256

    aa52d9cdc2705ced8c9538057172056a5d771e7886db22633545a2deba23e479

  • SHA512

    a69cc7ccaf1c17b03174290c3bd0e1fe8c55c01d44bad05881ee449ad6b697fddbaee946be64133c00c12962887e1f4c51cadba0b3f4b930f6b1010221de9b75

  • SSDEEP

    384:MnyhSksAVndb4G3w2NMsG9OqvhyY3Q6oVxYwwsRhg7+iXXRodY6kLdAeMo:1hSksandb4GgyMsp4hyYtoVxYdT7ZXqg

Malware Config

Extracted

Family

sakula

C2

http://vpn.premrera.com:443/viewpre.asp?cstring=%s&tom=%d&id=%d

http://vpn.premrera.com:443/photo/%s.jpg?id=%d

http://173.254.226.212:443/viewpre.asp?cstring=%s&tom=%d&id=%d

http://173.254.226.212:443/photo/%s.jpg?id=%d

Targets

    • Target

      NEAS.b1cd4f746c4e24af485938411c8b5940_JC.exe

    • Size

      40KB

    • MD5

      b1cd4f746c4e24af485938411c8b5940

    • SHA1

      fe1e3045c3c8100675afdc2f92b709398fa91697

    • SHA256

      aa52d9cdc2705ced8c9538057172056a5d771e7886db22633545a2deba23e479

    • SHA512

      a69cc7ccaf1c17b03174290c3bd0e1fe8c55c01d44bad05881ee449ad6b697fddbaee946be64133c00c12962887e1f4c51cadba0b3f4b930f6b1010221de9b75

    • SSDEEP

      384:MnyhSksAVndb4G3w2NMsG9OqvhyY3Q6oVxYwwsRhg7+iXXRodY6kLdAeMo:1hSksandb4GgyMsp4hyYtoVxYdT7ZXqg

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks