General

  • Target

    a89b0d8033d218469bc3bb0c1b81373db8a2a7d705349b8519815c4d0581dc1cN.exe

  • Size

    43KB

  • Sample

    241211-cekmxszqa1

  • MD5

    42d24e9a5831fc1009dfbb284a65e190

  • SHA1

    de4edcb8623382d09b4e3e11ac0151d5b09747f6

  • SHA256

    a89b0d8033d218469bc3bb0c1b81373db8a2a7d705349b8519815c4d0581dc1c

  • SHA512

    9238d2c4f922ee75748e5e976a71e4a5dff7eaddc8f54c3188c37d8aa1048120cfeb15d9e03d31e59d2c9f8703cead229a0d291879139da9a44160571c2fddae

  • SSDEEP

    768:+U9XnKJv8KrtPNxT4oreP7cIK3yQpdk6x8pf9m4P/S0hVvIZiGDZ6RO8nHE8taqX:+U9abrtX4oocIK3yQkaY9z/S0hhy6k8J

Malware Config

Targets

    • Target

      a89b0d8033d218469bc3bb0c1b81373db8a2a7d705349b8519815c4d0581dc1cN.exe

    • Size

      43KB

    • MD5

      42d24e9a5831fc1009dfbb284a65e190

    • SHA1

      de4edcb8623382d09b4e3e11ac0151d5b09747f6

    • SHA256

      a89b0d8033d218469bc3bb0c1b81373db8a2a7d705349b8519815c4d0581dc1c

    • SHA512

      9238d2c4f922ee75748e5e976a71e4a5dff7eaddc8f54c3188c37d8aa1048120cfeb15d9e03d31e59d2c9f8703cead229a0d291879139da9a44160571c2fddae

    • SSDEEP

      768:+U9XnKJv8KrtPNxT4oreP7cIK3yQpdk6x8pf9m4P/S0hVvIZiGDZ6RO8nHE8taqX:+U9abrtX4oocIK3yQkaY9z/S0hhy6k8J

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks