General

  • Target

    cb9ecf13134922777a9e8f656844275a.zip

  • Size

    1.2MB

  • Sample

    240831-s2lrha1fmq

  • MD5

    21b82e14b4d6b9fc43d509802dfdefca

  • SHA1

    c1729e849d0ae71bad2b63ebaf89c142ce68627a

  • SHA256

    77e9abe775b215cb41e49de45e5e4f1d1163cc1e09ce6021351823701723b533

  • SHA512

    11f53a114e7c61fc428bc811a35f1bb75971e473f803f11d01bee7b8c18f39afb3c4671fe221091e0f97e6199b87c9a0752afecdf499e9f77f7e2e7f9ea2e5e3

  • SSDEEP

    24576:UMJLqvKOMxo6foh9Mw3VHsTuFyDFQlTMQHkNw/Fxu20/MHdVvH0I2KhThGRagX:pJevLqo6foh9vVHQu0k2w/Fh00HfPhT4

Malware Config

Targets

    • Target

      2b6862758d7e1fa0b613e8ef792cc1c36a85e6c0806094fb9cbe5c36045e1dbf

    • Size

      4.0MB

    • MD5

      cb9ecf13134922777a9e8f656844275a

    • SHA1

      38a46544e021317d1a522c06d66844319ef3b3f4

    • SHA256

      2b6862758d7e1fa0b613e8ef792cc1c36a85e6c0806094fb9cbe5c36045e1dbf

    • SHA512

      587e9ec12d68c1cdcc68c01e0e59674ef73ca352d4b9f80d96db831b86cc495da1f48390f639a208264fcb4432567c9b7b5164997f41b737e711cfd6c4196286

    • SSDEEP

      24576:DF9mrnE2Z1y/6oTNBZrBEu8C7jnIQCwRO/wTGS5DBMY4:DD2Z1qT3Zz888QCwRO/wT/aY4

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks