General

  • Target

    8c048cf179b45e1f7d67fa91e3bc13b3c838c32d17e1aa039ba721a83a515dbd

  • Size

    43KB

  • Sample

    240904-avcadasend

  • MD5

    acbdcf026ff1e045f1c7995efc916092

  • SHA1

    e7d7fed7f56585922a4d4bcfa7c49bf7e39cffdb

  • SHA256

    8c048cf179b45e1f7d67fa91e3bc13b3c838c32d17e1aa039ba721a83a515dbd

  • SHA512

    6e70a5fc74ad0df3efad5ee4abc97a7210d6adcb6b3b3d1ce1c3629b40c23397957bc32814d12a18f4d84e5e3acddaefa7a5b28d046d6c331e2bd5cdeff57aa6

  • SSDEEP

    768:+U9XnKJv8KrtPNxT4oreP7cIK3yQpdk6x8pf9m4P/S0hVvIZiGDZ6RO8nHE8taqp:+U9abrtX4oocIK3yQkaY9z/S0hhy6k8D

Malware Config

Targets

    • Target

      8c048cf179b45e1f7d67fa91e3bc13b3c838c32d17e1aa039ba721a83a515dbd

    • Size

      43KB

    • MD5

      acbdcf026ff1e045f1c7995efc916092

    • SHA1

      e7d7fed7f56585922a4d4bcfa7c49bf7e39cffdb

    • SHA256

      8c048cf179b45e1f7d67fa91e3bc13b3c838c32d17e1aa039ba721a83a515dbd

    • SHA512

      6e70a5fc74ad0df3efad5ee4abc97a7210d6adcb6b3b3d1ce1c3629b40c23397957bc32814d12a18f4d84e5e3acddaefa7a5b28d046d6c331e2bd5cdeff57aa6

    • SSDEEP

      768:+U9XnKJv8KrtPNxT4oreP7cIK3yQpdk6x8pf9m4P/S0hVvIZiGDZ6RO8nHE8taqp:+U9abrtX4oocIK3yQkaY9z/S0hhy6k8D

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks