General

  • Target

    dbf16b3fbe1e72684582b200e16c998f10e4d8114550083646da48c6aaabdf49N.exe

  • Size

    60KB

  • Sample

    241126-v24nesxncm

  • MD5

    407cc6fb88936e274a054981c47beeb0

  • SHA1

    0b45a9c2e4edf47d86c9f3b8a238b1ad84d9aba2

  • SHA256

    dbf16b3fbe1e72684582b200e16c998f10e4d8114550083646da48c6aaabdf49

  • SHA512

    158c3d74c278d185d70e29f9067bf0fe9100f3e008416215bb9350f14eba62192de220dec16c08a433e68ac8963ff9f11bb4025ee77bee5dd8c15661c6305f8c

  • SSDEEP

    1536:iZioIoCwbYP4nuEApQK4TQbtY2gA9DX+ytBO8c3G3eTJ/+:iEoIlwIguEA4c5DgA9DOyq0eF2

Malware Config

Targets

    • Target

      dbf16b3fbe1e72684582b200e16c998f10e4d8114550083646da48c6aaabdf49N.exe

    • Size

      60KB

    • MD5

      407cc6fb88936e274a054981c47beeb0

    • SHA1

      0b45a9c2e4edf47d86c9f3b8a238b1ad84d9aba2

    • SHA256

      dbf16b3fbe1e72684582b200e16c998f10e4d8114550083646da48c6aaabdf49

    • SHA512

      158c3d74c278d185d70e29f9067bf0fe9100f3e008416215bb9350f14eba62192de220dec16c08a433e68ac8963ff9f11bb4025ee77bee5dd8c15661c6305f8c

    • SSDEEP

      1536:iZioIoCwbYP4nuEApQK4TQbtY2gA9DX+ytBO8c3G3eTJ/+:iEoIlwIguEA4c5DgA9DOyq0eF2

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks