General

  • Target

    NEAS.d19f155c08dd3c74c5054db14a3a9e20.exe

  • Size

    67KB

  • Sample

    231115-hqwr8afb8w

  • MD5

    d19f155c08dd3c74c5054db14a3a9e20

  • SHA1

    9bf1740dc739b076b9827a0700663e62c97e8f9c

  • SHA256

    e520e77cef483db5b8dd39efecdcf73989970d32c5c37690fdf77158bdd3514d

  • SHA512

    b76a2a8dce84db2166e3ef9e71edfab9000d8b1fdc745bc5183857c702a67c02c6298789745bd96ed232a06162fca04f9e26c6c4d11fe443cf7167a43f33537a

  • SSDEEP

    768:u7Xezc/T6Zp14hyYtoVxYF9mHF1yD3BmNV8PsED3VK2+ZtyOjgO4r9vFAg2rqi:a6zqhyYtkYWI3BDYTjipvF2L

Malware Config

Extracted

Family

sakula

C2

http://www.we11point.com:443/view.asp?cookie=%s&type=%d&vid=%d

http://www.we11point.com:443/photo/%s.jpg?vid=%d

Targets

    • Target

      NEAS.d19f155c08dd3c74c5054db14a3a9e20.exe

    • Size

      67KB

    • MD5

      d19f155c08dd3c74c5054db14a3a9e20

    • SHA1

      9bf1740dc739b076b9827a0700663e62c97e8f9c

    • SHA256

      e520e77cef483db5b8dd39efecdcf73989970d32c5c37690fdf77158bdd3514d

    • SHA512

      b76a2a8dce84db2166e3ef9e71edfab9000d8b1fdc745bc5183857c702a67c02c6298789745bd96ed232a06162fca04f9e26c6c4d11fe443cf7167a43f33537a

    • SSDEEP

      768:u7Xezc/T6Zp14hyYtoVxYF9mHF1yD3BmNV8PsED3VK2+ZtyOjgO4r9vFAg2rqi:a6zqhyYtkYWI3BDYTjipvF2L

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks