General

  • Target

    d3d1fe36737a9d3f86eb721aedafe8413cac24d1fe4db0fd24b36b296cadfa73

  • Size

    35KB

  • Sample

    241125-eyxgyayjgt

  • MD5

    366d6691f018b79df5260496cbe792d6

  • SHA1

    94ad693b7e2808fb82c4b30d4482d9c8989e2a07

  • SHA256

    d3d1fe36737a9d3f86eb721aedafe8413cac24d1fe4db0fd24b36b296cadfa73

  • SHA512

    c6d6f15a697cee654ab901a2100c21b937d63068f3440c5b44e8957a03ad28719c3f085dc4a6ae4cda18f9c993242d4a58796f460954d852ba7d859b6cc90193

  • SSDEEP

    768:lwbYGCv4nuEcJpQK4TQbtKvXwXgA9lJJea+yGCJQqeWnAEv2647Dc:lwbYP4nuEApQK4TQbtY2gA9DX+ytBO6

Malware Config

Targets

    • Target

      d3d1fe36737a9d3f86eb721aedafe8413cac24d1fe4db0fd24b36b296cadfa73

    • Size

      35KB

    • MD5

      366d6691f018b79df5260496cbe792d6

    • SHA1

      94ad693b7e2808fb82c4b30d4482d9c8989e2a07

    • SHA256

      d3d1fe36737a9d3f86eb721aedafe8413cac24d1fe4db0fd24b36b296cadfa73

    • SHA512

      c6d6f15a697cee654ab901a2100c21b937d63068f3440c5b44e8957a03ad28719c3f085dc4a6ae4cda18f9c993242d4a58796f460954d852ba7d859b6cc90193

    • SSDEEP

      768:lwbYGCv4nuEcJpQK4TQbtKvXwXgA9lJJea+yGCJQqeWnAEv2647Dc:lwbYP4nuEApQK4TQbtY2gA9DX+ytBO6

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks