General

  • Target

    9ac61ae0d44028ab818411e0a7a9479e7a9b48d7989ac1d69874946bbd369469

  • Size

    103KB

  • Sample

    240416-akk5jaeb3v

  • MD5

    964dbcc033f8a68ec51b8ac890c62420

  • SHA1

    9fb6447c754ac4ae7736e974494b77cf81ab388a

  • SHA256

    9ac61ae0d44028ab818411e0a7a9479e7a9b48d7989ac1d69874946bbd369469

  • SHA512

    a40000e894f3dcb352a219fc1b3371e2065d664770f33b4ae08bb3a7c0089b7be4eab3b8427c891f62d33411ebb1f889470beac144140d621e89f63aeeb3c4b3

  • SSDEEP

    1536:egaj1hJL1d9t0MIeboal8bCKxo7h0RPSaml0Nz30rtr08q:d0hpzz6xGhpamyF30BA8q

Malware Config

Targets

    • Target

      9ac61ae0d44028ab818411e0a7a9479e7a9b48d7989ac1d69874946bbd369469

    • Size

      103KB

    • MD5

      964dbcc033f8a68ec51b8ac890c62420

    • SHA1

      9fb6447c754ac4ae7736e974494b77cf81ab388a

    • SHA256

      9ac61ae0d44028ab818411e0a7a9479e7a9b48d7989ac1d69874946bbd369469

    • SHA512

      a40000e894f3dcb352a219fc1b3371e2065d664770f33b4ae08bb3a7c0089b7be4eab3b8427c891f62d33411ebb1f889470beac144140d621e89f63aeeb3c4b3

    • SSDEEP

      1536:egaj1hJL1d9t0MIeboal8bCKxo7h0RPSaml0Nz30rtr08q:d0hpzz6xGhpamyF30BA8q

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula payload

    • Detects executables built or packed with MPress PE compressor

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks