General

  • Target

    a9430482e5695c679f391429c7f7a6d773985f388057e856d50a54d1b19f463b.exe

  • Size

    35KB

  • Sample

    241210-w2tc5axrcm

  • MD5

    3830e2cf4d20c7a636a6df30b6c08b45

  • SHA1

    f45c52b83a4ce51f947f88d6a461b60ba7059461

  • SHA256

    a9430482e5695c679f391429c7f7a6d773985f388057e856d50a54d1b19f463b

  • SHA512

    76cc4fa6a744001626319d4e365eee9f69e68aebe91fcd7555a8089632195740bfeb5c42ef4ae6429046dbb756ad686b2dd7c4d92b11bf9545dbb624587b0f52

  • SSDEEP

    768:TwbYGCv4nuEcJpQK4TQbtKvXwXgA9lJJea+yGCJQqeWnAEv2647DC:TwbYP4nuEApQK4TQbtY2gA9DX+ytBOE

Malware Config

Targets

    • Target

      a9430482e5695c679f391429c7f7a6d773985f388057e856d50a54d1b19f463b.exe

    • Size

      35KB

    • MD5

      3830e2cf4d20c7a636a6df30b6c08b45

    • SHA1

      f45c52b83a4ce51f947f88d6a461b60ba7059461

    • SHA256

      a9430482e5695c679f391429c7f7a6d773985f388057e856d50a54d1b19f463b

    • SHA512

      76cc4fa6a744001626319d4e365eee9f69e68aebe91fcd7555a8089632195740bfeb5c42ef4ae6429046dbb756ad686b2dd7c4d92b11bf9545dbb624587b0f52

    • SSDEEP

      768:TwbYGCv4nuEcJpQK4TQbtKvXwXgA9lJJea+yGCJQqeWnAEv2647DC:TwbYP4nuEApQK4TQbtY2gA9DX+ytBOE

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks