General

  • Target

    db9bf60ee63a0d780b6f319a621311015bc59d615f10f222984e36c7b3681af0N.exe

  • Size

    43KB

  • Sample

    250103-11y97symap

  • MD5

    d8e42b154270ac67053f90c2ad62c9c0

  • SHA1

    0add2543f56eec8a2fb195a4e44ade3c45f4acec

  • SHA256

    db9bf60ee63a0d780b6f319a621311015bc59d615f10f222984e36c7b3681af0

  • SHA512

    4f8979210a81b229fa155861581b660253a923fdf3d65d7ff457a4a222a8e24d9c2969c86719051f9d8ab08718ba7058e984e3dea15846ee71fa307d11fa35a9

  • SSDEEP

    768:+U9XnKJv8KrtPNxT4oreP7cIK3yQpdk6x8pf9m4P/S0hVvIZiGDZ6RO8nHE8taqm:+U9abrtX4oocIK3yQkaY9z/S0hhy6k8Q

Malware Config

Targets

    • Target

      db9bf60ee63a0d780b6f319a621311015bc59d615f10f222984e36c7b3681af0N.exe

    • Size

      43KB

    • MD5

      d8e42b154270ac67053f90c2ad62c9c0

    • SHA1

      0add2543f56eec8a2fb195a4e44ade3c45f4acec

    • SHA256

      db9bf60ee63a0d780b6f319a621311015bc59d615f10f222984e36c7b3681af0

    • SHA512

      4f8979210a81b229fa155861581b660253a923fdf3d65d7ff457a4a222a8e24d9c2969c86719051f9d8ab08718ba7058e984e3dea15846ee71fa307d11fa35a9

    • SSDEEP

      768:+U9XnKJv8KrtPNxT4oreP7cIK3yQpdk6x8pf9m4P/S0hVvIZiGDZ6RO8nHE8taqm:+U9abrtX4oocIK3yQkaY9z/S0hhy6k8Q

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks