General

  • Target

    c19745bcc719652675b19bc6ae6ee2eca8fa5fe3b9c24ce89f5b5913366e3f14.exe

  • Size

    102KB

  • Sample

    241112-jbkxvaxgpk

  • MD5

    1c44426d688ceeb9f736ef5ed3b91395

  • SHA1

    28dcdb900d9e1b35b4923ec8aa5a99bccaa0b4ee

  • SHA256

    c19745bcc719652675b19bc6ae6ee2eca8fa5fe3b9c24ce89f5b5913366e3f14

  • SHA512

    3e7c50ac0e26e05ef99e5d5fac2c8cb5480f7cfb03bcb9e2379d6e7d3c565de29fa1c0ea51c2c1b006a1eea3afe9d2636268d59e35712b8876538e4f235928bd

  • SSDEEP

    1536:jJbCiJVkgMaT2itTkjoRXnM48dXFajVPkPLnlxsz30rtrQ390:tbfVk29te2juPLlxo30Bs390

Malware Config

Extracted

Family

sakula

C2

www.savmpet.com

Targets

    • Target

      c19745bcc719652675b19bc6ae6ee2eca8fa5fe3b9c24ce89f5b5913366e3f14.exe

    • Size

      102KB

    • MD5

      1c44426d688ceeb9f736ef5ed3b91395

    • SHA1

      28dcdb900d9e1b35b4923ec8aa5a99bccaa0b4ee

    • SHA256

      c19745bcc719652675b19bc6ae6ee2eca8fa5fe3b9c24ce89f5b5913366e3f14

    • SHA512

      3e7c50ac0e26e05ef99e5d5fac2c8cb5480f7cfb03bcb9e2379d6e7d3c565de29fa1c0ea51c2c1b006a1eea3afe9d2636268d59e35712b8876538e4f235928bd

    • SSDEEP

      1536:jJbCiJVkgMaT2itTkjoRXnM48dXFajVPkPLnlxsz30rtrQ390:tbfVk29te2juPLlxo30Bs390

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks