General

  • Target

    696988744641e0f6a18efe1d1bee75a212399948a7d04db1be9e5d1c0260d3ccN.exe

  • Size

    43KB

  • Sample

    250107-l588msykbq

  • MD5

    c92679d1a19ed105b217a819dd246bf0

  • SHA1

    417f3641b2f74f15cc5f7f41a986d8269b05c5c9

  • SHA256

    696988744641e0f6a18efe1d1bee75a212399948a7d04db1be9e5d1c0260d3cc

  • SHA512

    777b133e8d75a76b840ea78a6b99caa22a71f306a5ce8b2f9436338bb66561155156ace1d49c02454bb7ad2297c3ce82c9e265c56a3becfb3470bfc6a86e5f3b

  • SSDEEP

    768:+U9XnKJv8KrtPNxT4oreP7cIK3yQpdk6x8pf9m4P/S0hVvIZiGDZ6RO8nHE8taq5:+U9abrtX4oocIK3yQkaY9z/S0hhy6k8b

Malware Config

Targets

    • Target

      696988744641e0f6a18efe1d1bee75a212399948a7d04db1be9e5d1c0260d3ccN.exe

    • Size

      43KB

    • MD5

      c92679d1a19ed105b217a819dd246bf0

    • SHA1

      417f3641b2f74f15cc5f7f41a986d8269b05c5c9

    • SHA256

      696988744641e0f6a18efe1d1bee75a212399948a7d04db1be9e5d1c0260d3cc

    • SHA512

      777b133e8d75a76b840ea78a6b99caa22a71f306a5ce8b2f9436338bb66561155156ace1d49c02454bb7ad2297c3ce82c9e265c56a3becfb3470bfc6a86e5f3b

    • SSDEEP

      768:+U9XnKJv8KrtPNxT4oreP7cIK3yQpdk6x8pf9m4P/S0hVvIZiGDZ6RO8nHE8taq5:+U9abrtX4oocIK3yQkaY9z/S0hhy6k8b

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks