General

  • Target

    ec1ed563d84bb170900b25fc09663766d80242a318f68e31b3ea3954fd5f85b6

  • Size

    114KB

  • Sample

    250101-e5wh8avldy

  • MD5

    a8205d11cfeeb09621d2f88962cc5173

  • SHA1

    5e546fde94cd7dcc2b37aa3f8d75a925fc054063

  • SHA256

    ec1ed563d84bb170900b25fc09663766d80242a318f68e31b3ea3954fd5f85b6

  • SHA512

    9de2da6d17b235d24c0b2d71716a75f553b99b599be2df48e2f72f18c162481b94da639591b2fe1f70f116720801ae08ee80d9e722ac079b967f6d0ed53a37bd

  • SSDEEP

    1536:Loaj1hJL1S9t0MIeboal8bCKxo7h0RPLJNz30rtriCr0nJnHPoq1nouy8TRg4:c0hpgz6xGhYJF30Blr0nhoutTRg4

Malware Config

Targets

    • Target

      ec1ed563d84bb170900b25fc09663766d80242a318f68e31b3ea3954fd5f85b6

    • Size

      114KB

    • MD5

      a8205d11cfeeb09621d2f88962cc5173

    • SHA1

      5e546fde94cd7dcc2b37aa3f8d75a925fc054063

    • SHA256

      ec1ed563d84bb170900b25fc09663766d80242a318f68e31b3ea3954fd5f85b6

    • SHA512

      9de2da6d17b235d24c0b2d71716a75f553b99b599be2df48e2f72f18c162481b94da639591b2fe1f70f116720801ae08ee80d9e722ac079b967f6d0ed53a37bd

    • SSDEEP

      1536:Loaj1hJL1S9t0MIeboal8bCKxo7h0RPLJNz30rtriCr0nJnHPoq1nouy8TRg4:c0hpgz6xGhYJF30Blr0nhoutTRg4

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks