General

  • Target

    094e52199914e48af79620b38e2561d25e2ae6cad155c20dc25ba904c02bbaeb

  • Size

    332KB

  • Sample

    240508-xpdbtaab81

  • MD5

    b933b44c5a0ab28ce50d5bfe6ad735c0

  • SHA1

    b745072e5e6dc0bc6f844d08f832ca732eff1497

  • SHA256

    094e52199914e48af79620b38e2561d25e2ae6cad155c20dc25ba904c02bbaeb

  • SHA512

    3d278648445efb9377ca0a968a0016430967dda9129734ca8d3e32b9c25cf5798a3da51f1f7779111d9d289726c6ffa4701513b03ff664b15491acf0ee7bdf42

  • SSDEEP

    6144:Nj9c2WYd30BKmiPVpU3ypIPr3D3StNynyS/S:NSI2H+

Malware Config

Extracted

Family

sakula

C2

www.savmpet.com

Targets

    • Target

      094e52199914e48af79620b38e2561d25e2ae6cad155c20dc25ba904c02bbaeb

    • Size

      332KB

    • MD5

      b933b44c5a0ab28ce50d5bfe6ad735c0

    • SHA1

      b745072e5e6dc0bc6f844d08f832ca732eff1497

    • SHA256

      094e52199914e48af79620b38e2561d25e2ae6cad155c20dc25ba904c02bbaeb

    • SHA512

      3d278648445efb9377ca0a968a0016430967dda9129734ca8d3e32b9c25cf5798a3da51f1f7779111d9d289726c6ffa4701513b03ff664b15491acf0ee7bdf42

    • SSDEEP

      6144:Nj9c2WYd30BKmiPVpU3ypIPr3D3StNynyS/S:NSI2H+

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks