General

  • Target

    2d2db6405523c9e123d074e3bd5b2474275387d5d4b6b82d871977772124e449

  • Size

    114KB

  • Sample

    241113-zmsptsyhnn

  • MD5

    dd790524d54f8734ecd52e286ac21f81

  • SHA1

    a273867030e158286900b3e3c8dfc99d17997864

  • SHA256

    2d2db6405523c9e123d074e3bd5b2474275387d5d4b6b82d871977772124e449

  • SHA512

    8af6bcbc8860bc6f74b754719097db64963743c495a99febfb4325ad16f4eb2ccdbe50f4a503595847f5494a7c10017d9d137d1c0056760137f343268b22ebf7

  • SSDEEP

    1536:Loaj1hJL1S9t0MIeboal8bCKxo7h0RPLJNz30rtriCr0nJnHPoq1nouy8jRg5:c0hpgz6xGhYJF30Blr0nhoutjRg5

Malware Config

Targets

    • Target

      2d2db6405523c9e123d074e3bd5b2474275387d5d4b6b82d871977772124e449

    • Size

      114KB

    • MD5

      dd790524d54f8734ecd52e286ac21f81

    • SHA1

      a273867030e158286900b3e3c8dfc99d17997864

    • SHA256

      2d2db6405523c9e123d074e3bd5b2474275387d5d4b6b82d871977772124e449

    • SHA512

      8af6bcbc8860bc6f74b754719097db64963743c495a99febfb4325ad16f4eb2ccdbe50f4a503595847f5494a7c10017d9d137d1c0056760137f343268b22ebf7

    • SSDEEP

      1536:Loaj1hJL1S9t0MIeboal8bCKxo7h0RPLJNz30rtriCr0nJnHPoq1nouy8jRg5:c0hpgz6xGhYJF30Blr0nhoutjRg5

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks