General

  • Target

    995acf1535e99250c84e55149cd66b0e5d17fdd4cfe20408f9b09d32f264beb9N

  • Size

    102KB

  • Sample

    241111-17dbbaxhqp

  • MD5

    eb81490cac03f92824499c60d7872db0

  • SHA1

    0c82890fab442672038519df21d958e39d6953d1

  • SHA256

    995acf1535e99250c84e55149cd66b0e5d17fdd4cfe20408f9b09d32f264beb9

  • SHA512

    b2bfebb9342c0c5a6f85518789a881d07763680d6ce14c8ec0ef0736c12d7c0a0cee9403800413d320d4c5e63a661c359df84db0ff307dec56d52e358e1b9f80

  • SSDEEP

    1536:jJbCiJVkgMaT2itTkjoRXnM48dXFajVPkPLnlxsz30rtrQ39M:tbfVk29te2juPLlxo30Bs39M

Malware Config

Extracted

Family

sakula

C2

www.savmpet.com

Targets

    • Target

      995acf1535e99250c84e55149cd66b0e5d17fdd4cfe20408f9b09d32f264beb9N

    • Size

      102KB

    • MD5

      eb81490cac03f92824499c60d7872db0

    • SHA1

      0c82890fab442672038519df21d958e39d6953d1

    • SHA256

      995acf1535e99250c84e55149cd66b0e5d17fdd4cfe20408f9b09d32f264beb9

    • SHA512

      b2bfebb9342c0c5a6f85518789a881d07763680d6ce14c8ec0ef0736c12d7c0a0cee9403800413d320d4c5e63a661c359df84db0ff307dec56d52e358e1b9f80

    • SSDEEP

      1536:jJbCiJVkgMaT2itTkjoRXnM48dXFajVPkPLnlxsz30rtrQ39M:tbfVk29te2juPLlxo30Bs39M

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks