General

  • Target

    f54c9ff519ffedbcb13506907839811a3e7ec9b05b0bef311edfe0b7a78af672

  • Size

    58KB

  • Sample

    241220-k8pgzavphn

  • MD5

    96cb81d727574193eded6e54abc49747

  • SHA1

    195a31c82c7ae0efb31972e0c94276bec8920128

  • SHA256

    f54c9ff519ffedbcb13506907839811a3e7ec9b05b0bef311edfe0b7a78af672

  • SHA512

    fa88e6c3dc3daf2a44e04a201a2277ae92879bd89da118c7c18424ab1c12aa6c8a5f1ba24a6498c45d51e6333c333c36afb3979d1fd7c317c11177e1ba9fcb8a

  • SSDEEP

    1536:iZioIoCwbYP4nuEApQK4TQbtY2gA9DX+ytBO8c3G3eTJ/p:iEoIlwIguEA4c5DgA9DOyq0eFR

Malware Config

Targets

    • Target

      f54c9ff519ffedbcb13506907839811a3e7ec9b05b0bef311edfe0b7a78af672

    • Size

      58KB

    • MD5

      96cb81d727574193eded6e54abc49747

    • SHA1

      195a31c82c7ae0efb31972e0c94276bec8920128

    • SHA256

      f54c9ff519ffedbcb13506907839811a3e7ec9b05b0bef311edfe0b7a78af672

    • SHA512

      fa88e6c3dc3daf2a44e04a201a2277ae92879bd89da118c7c18424ab1c12aa6c8a5f1ba24a6498c45d51e6333c333c36afb3979d1fd7c317c11177e1ba9fcb8a

    • SSDEEP

      1536:iZioIoCwbYP4nuEApQK4TQbtY2gA9DX+ytBO8c3G3eTJ/p:iEoIlwIguEA4c5DgA9DOyq0eFR

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks