General

  • Target

    6ce1b780676863c19f582b654c2818f48a7a3da5a8575ab10f520eb37717ae71

  • Size

    35KB

  • Sample

    241124-31e8faspfm

  • MD5

    c7fa7d86cdc55701319f470bf8021bee

  • SHA1

    35f209f4242eaec55a422abfac4c91e66e4aeb62

  • SHA256

    6ce1b780676863c19f582b654c2818f48a7a3da5a8575ab10f520eb37717ae71

  • SHA512

    75a8409debf429b7fcb36d0ff542bc29283e7cea33be7d6a0f1ce60ff9ecf4b945a954865fe0f58e64758ee5e71546d4f41af36700a99c82ea23e22bfdea31dd

  • SSDEEP

    768:lwbYGCv4nuEcJpQK4TQbtKvXwXgA9lJJea+yGCJQqeWnAEv2647Dp:lwbYP4nuEApQK4TQbtY2gA9DX+ytBOf

Malware Config

Targets

    • Target

      6ce1b780676863c19f582b654c2818f48a7a3da5a8575ab10f520eb37717ae71

    • Size

      35KB

    • MD5

      c7fa7d86cdc55701319f470bf8021bee

    • SHA1

      35f209f4242eaec55a422abfac4c91e66e4aeb62

    • SHA256

      6ce1b780676863c19f582b654c2818f48a7a3da5a8575ab10f520eb37717ae71

    • SHA512

      75a8409debf429b7fcb36d0ff542bc29283e7cea33be7d6a0f1ce60ff9ecf4b945a954865fe0f58e64758ee5e71546d4f41af36700a99c82ea23e22bfdea31dd

    • SSDEEP

      768:lwbYGCv4nuEcJpQK4TQbtKvXwXgA9lJJea+yGCJQqeWnAEv2647Dp:lwbYP4nuEApQK4TQbtY2gA9DX+ytBOf

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks