General

  • Target

    c4e54193e632fe92d7648e560243c9401267e5d1fef48351aeb9b1b1bb7eea04.exe

  • Size

    58KB

  • Sample

    250107-edhs2svmcl

  • MD5

    7734199d6f96a1638a1b240de6588c31

  • SHA1

    a73baf5120f92a41aa78d88110eb3229e94c313f

  • SHA256

    c4e54193e632fe92d7648e560243c9401267e5d1fef48351aeb9b1b1bb7eea04

  • SHA512

    3114c3bdd2e1dd624c74631759c3d6bb63abdbcbc24ea9e61842ae7a59c9901bd75207594b58f88d1a1b9bf6247c4e8eb50308816afee4b38c57604cc58e0268

  • SSDEEP

    1536:iZioIoCwbYP4nuEApQK4TQbtY2gA9DX+ytBO8c3G3eTJ/J:iEoIlwIguEA4c5DgA9DOyq0eFh

Malware Config

Targets

    • Target

      c4e54193e632fe92d7648e560243c9401267e5d1fef48351aeb9b1b1bb7eea04.exe

    • Size

      58KB

    • MD5

      7734199d6f96a1638a1b240de6588c31

    • SHA1

      a73baf5120f92a41aa78d88110eb3229e94c313f

    • SHA256

      c4e54193e632fe92d7648e560243c9401267e5d1fef48351aeb9b1b1bb7eea04

    • SHA512

      3114c3bdd2e1dd624c74631759c3d6bb63abdbcbc24ea9e61842ae7a59c9901bd75207594b58f88d1a1b9bf6247c4e8eb50308816afee4b38c57604cc58e0268

    • SSDEEP

      1536:iZioIoCwbYP4nuEApQK4TQbtY2gA9DX+ytBO8c3G3eTJ/J:iEoIlwIguEA4c5DgA9DOyq0eFh

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks