General

  • Target

    NEAS.76742b2efc5720b65781c32e1d46c2b0.exe

  • Size

    39KB

  • Sample

    231115-dz99rabd65

  • MD5

    76742b2efc5720b65781c32e1d46c2b0

  • SHA1

    b3eb4fb62baabae404cfaa20cbaafc3d0b9653d4

  • SHA256

    19a49ff73475d5791e5321ed0e97c27506a29f42f7aaddd046b4f2803d6c966a

  • SHA512

    71639a732333e73d998a474c5d1882c1c207871a6878b43c2399ed890a25ba50ec8f90ad8e5bb7c167ed1e71b05d0a27fe2cd3680805518a9e481dc7f8af96c1

  • SSDEEP

    384:Em7SCFozc/T94Umdjpxq4TqvhyY3Q6oVxYiOws0me86g7trW540hd76QLdAeMvVt:n7Xezc/T6Zp14hyYtoVxYIY370YjVt

Malware Config

Extracted

Family

sakula

C2

http://www.we11point.com:443/view.asp?cookie=%s&type=%d&vid=%d

http://www.we11point.com:443/photo/%s.jpg?vid=%d

Targets

    • Target

      NEAS.76742b2efc5720b65781c32e1d46c2b0.exe

    • Size

      39KB

    • MD5

      76742b2efc5720b65781c32e1d46c2b0

    • SHA1

      b3eb4fb62baabae404cfaa20cbaafc3d0b9653d4

    • SHA256

      19a49ff73475d5791e5321ed0e97c27506a29f42f7aaddd046b4f2803d6c966a

    • SHA512

      71639a732333e73d998a474c5d1882c1c207871a6878b43c2399ed890a25ba50ec8f90ad8e5bb7c167ed1e71b05d0a27fe2cd3680805518a9e481dc7f8af96c1

    • SSDEEP

      384:Em7SCFozc/T94Umdjpxq4TqvhyY3Q6oVxYiOws0me86g7trW540hd76QLdAeMvVt:n7Xezc/T6Zp14hyYtoVxYIY370YjVt

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks