General

  • Target

    f452fb032a1e64c8bed1aa52073ef8ac_JaffaCakes118

  • Size

    58KB

  • Sample

    240416-zw6ytaeb3z

  • MD5

    f452fb032a1e64c8bed1aa52073ef8ac

  • SHA1

    3774178742ec0bb16bc6f66ac188dc87377ac00f

  • SHA256

    c6e7692677eefb84c6d43cb09e01253bc4503989bb2fa70417f799e2ddeefaf7

  • SHA512

    7a392e80f7ffa232bc18d95f19cf9823912c4817ebd578a0448e4527c8ef56cf42d71eaa50da4fc978318e0b35a875a32ccc3e3fa2df273f6da4a1d0796bd7dd

  • SSDEEP

    1536:iZioIoCwbYP4nuEApQK4TQbtY2gA9DX+ytBO8c3G3eTJ/2:iEoIlwIguEA4c5DgA9DOyq0eFO

Malware Config

Targets

    • Target

      f452fb032a1e64c8bed1aa52073ef8ac_JaffaCakes118

    • Size

      58KB

    • MD5

      f452fb032a1e64c8bed1aa52073ef8ac

    • SHA1

      3774178742ec0bb16bc6f66ac188dc87377ac00f

    • SHA256

      c6e7692677eefb84c6d43cb09e01253bc4503989bb2fa70417f799e2ddeefaf7

    • SHA512

      7a392e80f7ffa232bc18d95f19cf9823912c4817ebd578a0448e4527c8ef56cf42d71eaa50da4fc978318e0b35a875a32ccc3e3fa2df273f6da4a1d0796bd7dd

    • SSDEEP

      1536:iZioIoCwbYP4nuEApQK4TQbtY2gA9DX+ytBO8c3G3eTJ/2:iEoIlwIguEA4c5DgA9DOyq0eFO

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks