General

  • Target

    017a9b7349ab4b4f010e6a697014c75872ebfba4d82f8c1b943cbcd71322da39N.exe

  • Size

    43KB

  • Sample

    250104-yzsd6axlap

  • MD5

    5000142d57c02901328ff944565227d0

  • SHA1

    636ba57de39c6090d328a431b84e008a8ebab551

  • SHA256

    017a9b7349ab4b4f010e6a697014c75872ebfba4d82f8c1b943cbcd71322da39

  • SHA512

    8f6ed4abbee66442cac52c1864394c933afae558d6e3d41040119d10a6ddf059749e7eda411a5112aea9d13411d6e3bd157e7228e15dff539a8ec0ff8c16f38d

  • SSDEEP

    768:+U9XnKJv8KrtPNxT4oreP7cIK3yQpdk6x8pf9m4P/S0hVvIZiGDZ6RO8nHE8taqY:+U9abrtX4oocIK3yQkaY9z/S0hhy6k8S

Malware Config

Targets

    • Target

      017a9b7349ab4b4f010e6a697014c75872ebfba4d82f8c1b943cbcd71322da39N.exe

    • Size

      43KB

    • MD5

      5000142d57c02901328ff944565227d0

    • SHA1

      636ba57de39c6090d328a431b84e008a8ebab551

    • SHA256

      017a9b7349ab4b4f010e6a697014c75872ebfba4d82f8c1b943cbcd71322da39

    • SHA512

      8f6ed4abbee66442cac52c1864394c933afae558d6e3d41040119d10a6ddf059749e7eda411a5112aea9d13411d6e3bd157e7228e15dff539a8ec0ff8c16f38d

    • SSDEEP

      768:+U9XnKJv8KrtPNxT4oreP7cIK3yQpdk6x8pf9m4P/S0hVvIZiGDZ6RO8nHE8taqY:+U9abrtX4oocIK3yQkaY9z/S0hhy6k8S

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks