General

  • Target

    0c7a1fe2d5db55931b602eb52e8af65bbaa72f912b5dc34da6a346b105ad8ce2N.exe

  • Size

    114KB

  • Sample

    250104-ff2vdaspfz

  • MD5

    aaa3a59353145c4db493fe89d8393180

  • SHA1

    64dd51d3073d4295d4bb42469f6eb8cb3c6d106f

  • SHA256

    0c7a1fe2d5db55931b602eb52e8af65bbaa72f912b5dc34da6a346b105ad8ce2

  • SHA512

    31085f1854b856b00a23952c0b078d472560e1ba3407dd6bc7b98cb51727c58c7e72ae4cbfceb129eaafbc711a2289aa5390897199a736c6fc8a7384e4508c9d

  • SSDEEP

    1536:Loaj1hJL1S9t0MIeboal8bCKxo7h0RPLJNz30rtriCr0nJnHPoq1nouy8TRgR:c0hpgz6xGhYJF30Blr0nhoutTRgR

Malware Config

Targets

    • Target

      0c7a1fe2d5db55931b602eb52e8af65bbaa72f912b5dc34da6a346b105ad8ce2N.exe

    • Size

      114KB

    • MD5

      aaa3a59353145c4db493fe89d8393180

    • SHA1

      64dd51d3073d4295d4bb42469f6eb8cb3c6d106f

    • SHA256

      0c7a1fe2d5db55931b602eb52e8af65bbaa72f912b5dc34da6a346b105ad8ce2

    • SHA512

      31085f1854b856b00a23952c0b078d472560e1ba3407dd6bc7b98cb51727c58c7e72ae4cbfceb129eaafbc711a2289aa5390897199a736c6fc8a7384e4508c9d

    • SSDEEP

      1536:Loaj1hJL1S9t0MIeboal8bCKxo7h0RPLJNz30rtriCr0nJnHPoq1nouy8TRgR:c0hpgz6xGhYJF30Blr0nhoutTRgR

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks