General

  • Target

    NEAS.933dada2954ed1e562a29ee19eebdbd0.exe

  • Size

    332KB

  • Sample

    231118-afnpvsha21

  • MD5

    933dada2954ed1e562a29ee19eebdbd0

  • SHA1

    ca8f91b05c5020abf7be11970a540313df562f4e

  • SHA256

    e0a4cbd3d21e451b89821bdb522238ace9a9f11db460e5b760e70fdde01c2475

  • SHA512

    7a62df3ffec1ec6e2213c30f965573b616850802fb1bc1b27220e93dbc8261b76489aff05bb691efdcf583c788391270b1704d4d2628f94bc3d36f397912d4b9

  • SSDEEP

    6144:Nj9c2WYd30BKmiPVpU3ypIPr3D3StNynyS/X:NSI2HD

Malware Config

Extracted

Family

sakula

C2

www.savmpet.com

Targets

    • Target

      NEAS.933dada2954ed1e562a29ee19eebdbd0.exe

    • Size

      332KB

    • MD5

      933dada2954ed1e562a29ee19eebdbd0

    • SHA1

      ca8f91b05c5020abf7be11970a540313df562f4e

    • SHA256

      e0a4cbd3d21e451b89821bdb522238ace9a9f11db460e5b760e70fdde01c2475

    • SHA512

      7a62df3ffec1ec6e2213c30f965573b616850802fb1bc1b27220e93dbc8261b76489aff05bb691efdcf583c788391270b1704d4d2628f94bc3d36f397912d4b9

    • SSDEEP

      6144:Nj9c2WYd30BKmiPVpU3ypIPr3D3StNynyS/X:NSI2HD

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks