General

  • Target

    de13a9f169eec46d904ad15ab11e06bc497334415c033edcd0f5d790b979ea04N.exe

  • Size

    58KB

  • Sample

    241123-qscq5avrdv

  • MD5

    5386435162b1f9cf66dcaa7800787fa0

  • SHA1

    a1b08c4415582a026f22d60620e245c15f6a993c

  • SHA256

    de13a9f169eec46d904ad15ab11e06bc497334415c033edcd0f5d790b979ea04

  • SHA512

    f45fcb1ebd7dc27b3d1b1940ca71247009a75b25b0e6c6d1886b1da4f83a8c3596b41c9086a3f007f07aff400dc5b0110e5e080a3a6066ef95bea90fe3fe6857

  • SSDEEP

    1536:iZioIoCwbYP4nuEApQK4TQbtY2gA9DX+ytBO8c3G3eTJ//:iEoIlwIguEA4c5DgA9DOyq0eFn

Malware Config

Targets

    • Target

      de13a9f169eec46d904ad15ab11e06bc497334415c033edcd0f5d790b979ea04N.exe

    • Size

      58KB

    • MD5

      5386435162b1f9cf66dcaa7800787fa0

    • SHA1

      a1b08c4415582a026f22d60620e245c15f6a993c

    • SHA256

      de13a9f169eec46d904ad15ab11e06bc497334415c033edcd0f5d790b979ea04

    • SHA512

      f45fcb1ebd7dc27b3d1b1940ca71247009a75b25b0e6c6d1886b1da4f83a8c3596b41c9086a3f007f07aff400dc5b0110e5e080a3a6066ef95bea90fe3fe6857

    • SSDEEP

      1536:iZioIoCwbYP4nuEApQK4TQbtY2gA9DX+ytBO8c3G3eTJ//:iEoIlwIguEA4c5DgA9DOyq0eFn

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks