General

  • Target

    f4073269824ced12048b4f954d55e1ed

  • Size

    92KB

  • Sample

    240409-zf45aaae83

  • MD5

    f4073269824ced12048b4f954d55e1ed

  • SHA1

    50ba7a8d979dfbfad4729f5a1a16f61cc82fc721

  • SHA256

    8708bd425e767f8230e7059e04279e90e8d9272b1b28e8e863df2c0f7ad28cd6

  • SHA512

    2d3a52d427ed72f0130b0f39393ae5bbcb5f5083a429ec8c75564a7634dd18bfa723c0ba21f438f9534807641edab87e7d3a8df080b5f6a6a3b33626738bd9fc

  • SSDEEP

    1536:TJbCiJVkgMaT2itTkjoRXnM48dXFajVPYxCEtkz30rtrs:9bfVk29te2jqxCEtg30Bw

Malware Config

Extracted

Family

sakula

C2

www.savmpet.com

Targets

    • Target

      f4073269824ced12048b4f954d55e1ed

    • Size

      92KB

    • MD5

      f4073269824ced12048b4f954d55e1ed

    • SHA1

      50ba7a8d979dfbfad4729f5a1a16f61cc82fc721

    • SHA256

      8708bd425e767f8230e7059e04279e90e8d9272b1b28e8e863df2c0f7ad28cd6

    • SHA512

      2d3a52d427ed72f0130b0f39393ae5bbcb5f5083a429ec8c75564a7634dd18bfa723c0ba21f438f9534807641edab87e7d3a8df080b5f6a6a3b33626738bd9fc

    • SSDEEP

      1536:TJbCiJVkgMaT2itTkjoRXnM48dXFajVPYxCEtkz30rtrs:9bfVk29te2jqxCEtg30Bw

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks