General

  • Target

    985f4740025cf6d9fadd42a7bf8d3918f9114d8e74a1701e369ded4d5a5f7d79N.exe

  • Size

    43KB

  • Sample

    241217-xdzexavrfj

  • MD5

    88bc6dfae635acc00f5ae70feca02420

  • SHA1

    24daf6748fdc8c5dc925b964680a68310b947672

  • SHA256

    985f4740025cf6d9fadd42a7bf8d3918f9114d8e74a1701e369ded4d5a5f7d79

  • SHA512

    077a66451b000ef6cad499622c3333beb4a62f4ff8d70ce8a6fb2ecc8fb744c4661f300da78bd1cb5e99ba485a4be527b3d7aaa005a4d658bb36b773cce698a4

  • SSDEEP

    768:+U9XnKJv8KrtPNxT4oreP7cIK3yQpdk6x8pf9m4P/S0hVvIZiGDZ6RO8nHE8taqA:+U9abrtX4oocIK3yQkaY9z/S0hhy6k8q

Malware Config

Targets

    • Target

      985f4740025cf6d9fadd42a7bf8d3918f9114d8e74a1701e369ded4d5a5f7d79N.exe

    • Size

      43KB

    • MD5

      88bc6dfae635acc00f5ae70feca02420

    • SHA1

      24daf6748fdc8c5dc925b964680a68310b947672

    • SHA256

      985f4740025cf6d9fadd42a7bf8d3918f9114d8e74a1701e369ded4d5a5f7d79

    • SHA512

      077a66451b000ef6cad499622c3333beb4a62f4ff8d70ce8a6fb2ecc8fb744c4661f300da78bd1cb5e99ba485a4be527b3d7aaa005a4d658bb36b773cce698a4

    • SSDEEP

      768:+U9XnKJv8KrtPNxT4oreP7cIK3yQpdk6x8pf9m4P/S0hVvIZiGDZ6RO8nHE8taqA:+U9abrtX4oocIK3yQkaY9z/S0hhy6k8q

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks