General

  • Target

    30fda57107c15c270f1e1ad31a65fa98df72fb1b39674da7d25371586d195b33N.exe

  • Size

    43KB

  • Sample

    250103-x5gzyayrgy

  • MD5

    6f1e7d17f1f30b483576910c2036c780

  • SHA1

    579cc72e4a1bb00bd5f8026fc075a6319b3b2da0

  • SHA256

    30fda57107c15c270f1e1ad31a65fa98df72fb1b39674da7d25371586d195b33

  • SHA512

    20f662ca4826a4a269f934ecd7db70b6c4115ee9b46b70dbfd8b421f104a85d071f06ef88788c534cbf82daf2391e09b94993d231fe89361a5169487f6ce985b

  • SSDEEP

    768:+U9XnKJv8KrtPNxT4oreP7cIK3yQpdk6x8pf9m4P/S0hVvIZiGDZ6RO8nHE8taqe:+U9abrtX4oocIK3yQkaY9z/S0hhy6k8o

Malware Config

Targets

    • Target

      30fda57107c15c270f1e1ad31a65fa98df72fb1b39674da7d25371586d195b33N.exe

    • Size

      43KB

    • MD5

      6f1e7d17f1f30b483576910c2036c780

    • SHA1

      579cc72e4a1bb00bd5f8026fc075a6319b3b2da0

    • SHA256

      30fda57107c15c270f1e1ad31a65fa98df72fb1b39674da7d25371586d195b33

    • SHA512

      20f662ca4826a4a269f934ecd7db70b6c4115ee9b46b70dbfd8b421f104a85d071f06ef88788c534cbf82daf2391e09b94993d231fe89361a5169487f6ce985b

    • SSDEEP

      768:+U9XnKJv8KrtPNxT4oreP7cIK3yQpdk6x8pf9m4P/S0hVvIZiGDZ6RO8nHE8taqe:+U9abrtX4oocIK3yQkaY9z/S0hhy6k8o

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks