General

  • Target

    NEAS.046f57ee81dbd6fe4b204c12a9a4cc20.exe

  • Size

    92KB

  • Sample

    231106-ad32rsgd34

  • MD5

    046f57ee81dbd6fe4b204c12a9a4cc20

  • SHA1

    803766b6ff668ba07274e1c513c74e004ce4ab0a

  • SHA256

    41d34efe0f87230408f3f04f38c462d8370d60142bbe527900bef0d67dffc320

  • SHA512

    a41448a619aa222a2c34367cb9ff276460ba14ee20721f74c5ba096141e2c25f36fff9bb9b36ec49f42eb3fa9f709795de56485df27a47164e6c839d93a0f0d0

  • SSDEEP

    1536:TJbCiJVkgMaT2itTkjoRXnM48dXFajVPYxCEtkz30rtrP:9bfVk29te2jqxCEtg30B7

Malware Config

Extracted

Family

sakula

C2

www.savmpet.com

Targets

    • Target

      NEAS.046f57ee81dbd6fe4b204c12a9a4cc20.exe

    • Size

      92KB

    • MD5

      046f57ee81dbd6fe4b204c12a9a4cc20

    • SHA1

      803766b6ff668ba07274e1c513c74e004ce4ab0a

    • SHA256

      41d34efe0f87230408f3f04f38c462d8370d60142bbe527900bef0d67dffc320

    • SHA512

      a41448a619aa222a2c34367cb9ff276460ba14ee20721f74c5ba096141e2c25f36fff9bb9b36ec49f42eb3fa9f709795de56485df27a47164e6c839d93a0f0d0

    • SSDEEP

      1536:TJbCiJVkgMaT2itTkjoRXnM48dXFajVPYxCEtkz30rtrP:9bfVk29te2jqxCEtg30B7

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks