General

  • Target

    feaa9e7f59a0d7126d00568346c59b2b_JaffaCakes118

  • Size

    58KB

  • Sample

    240421-hcg2xadg2w

  • MD5

    feaa9e7f59a0d7126d00568346c59b2b

  • SHA1

    a62e5ef5d2b6f398e6db8b9431688169f3587d88

  • SHA256

    514130d7721cac287622839aab81d89bc5866795ced287c1db682e919034a3a1

  • SHA512

    d8a9cbcdff4f2de6628d01f6d679a063a982f200b6eae1baeedcd00f12c931ca2b2c499418e70cca21dc344cc539263554cd3eaee74012d1e56439776809e6e9

  • SSDEEP

    1536:iZioIoCwbYP4nuEApQK4TQbtY2gA9DX+ytBO8c3G3eTJ/9:iEoIlwIguEA4c5DgA9DOyq0eF1

Malware Config

Targets

    • Target

      feaa9e7f59a0d7126d00568346c59b2b_JaffaCakes118

    • Size

      58KB

    • MD5

      feaa9e7f59a0d7126d00568346c59b2b

    • SHA1

      a62e5ef5d2b6f398e6db8b9431688169f3587d88

    • SHA256

      514130d7721cac287622839aab81d89bc5866795ced287c1db682e919034a3a1

    • SHA512

      d8a9cbcdff4f2de6628d01f6d679a063a982f200b6eae1baeedcd00f12c931ca2b2c499418e70cca21dc344cc539263554cd3eaee74012d1e56439776809e6e9

    • SSDEEP

      1536:iZioIoCwbYP4nuEApQK4TQbtY2gA9DX+ytBO8c3G3eTJ/9:iEoIlwIguEA4c5DgA9DOyq0eF1

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks