General

  • Target

    a8173c44fdf86a911d5e684ce89f768139d21c0a38f314b9fe1446472a47e03e.exe

  • Size

    43KB

  • Sample

    241210-y5kw9sxlgz

  • MD5

    4915012acb17290dbbe159c736a221ce

  • SHA1

    015e1e42d8ff65d23b95ee17711c9f3125b179eb

  • SHA256

    a8173c44fdf86a911d5e684ce89f768139d21c0a38f314b9fe1446472a47e03e

  • SHA512

    12ea0d13aa46759840131deed1cdde4bab758bcefea5aa8e1bba9d81c3040262e696bf60f50e1f4dc4b221744a970de45b64072842bc54a41a13e976d5deaf37

  • SSDEEP

    768:+U9XnKJv8KrtPNxT4oreP7cIK3yQpdk6x8pf9m4P/S0hVvIZiGDZ6RO8nHE8taqI:+U9abrtX4oocIK3yQkaY9z/S0hhy6k8S

Malware Config

Targets

    • Target

      a8173c44fdf86a911d5e684ce89f768139d21c0a38f314b9fe1446472a47e03e.exe

    • Size

      43KB

    • MD5

      4915012acb17290dbbe159c736a221ce

    • SHA1

      015e1e42d8ff65d23b95ee17711c9f3125b179eb

    • SHA256

      a8173c44fdf86a911d5e684ce89f768139d21c0a38f314b9fe1446472a47e03e

    • SHA512

      12ea0d13aa46759840131deed1cdde4bab758bcefea5aa8e1bba9d81c3040262e696bf60f50e1f4dc4b221744a970de45b64072842bc54a41a13e976d5deaf37

    • SSDEEP

      768:+U9XnKJv8KrtPNxT4oreP7cIK3yQpdk6x8pf9m4P/S0hVvIZiGDZ6RO8nHE8taqI:+U9abrtX4oocIK3yQkaY9z/S0hhy6k8S

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks