General

  • Target

    efd019000439a9e1d2768a18e212ed605ac47a91e25863ad8eb4fda03f2e0aa8

  • Size

    114KB

  • Sample

    250108-mfxnzsykan

  • MD5

    7a8e1c8246c6af76a6ac7cddb90d67a3

  • SHA1

    fb4997626a6499136b90b8b7bff26e197c46d021

  • SHA256

    efd019000439a9e1d2768a18e212ed605ac47a91e25863ad8eb4fda03f2e0aa8

  • SHA512

    38ea7f2b14725957f669f4a2407dec0c9d3d5e73ebdddf5fa9186625dc75e845a08b2787fdc67de21b3f12d6319951344c5590ebf8c6fd03a777c4e0cd247407

  • SSDEEP

    1536:Loaj1hJL1S9t0MIeboal8bCKxo7h0RPLJNz30rtriCr0nJnHPoq1nouy8TRgd:c0hpgz6xGhYJF30Blr0nhoutTRgd

Malware Config

Targets

    • Target

      efd019000439a9e1d2768a18e212ed605ac47a91e25863ad8eb4fda03f2e0aa8

    • Size

      114KB

    • MD5

      7a8e1c8246c6af76a6ac7cddb90d67a3

    • SHA1

      fb4997626a6499136b90b8b7bff26e197c46d021

    • SHA256

      efd019000439a9e1d2768a18e212ed605ac47a91e25863ad8eb4fda03f2e0aa8

    • SHA512

      38ea7f2b14725957f669f4a2407dec0c9d3d5e73ebdddf5fa9186625dc75e845a08b2787fdc67de21b3f12d6319951344c5590ebf8c6fd03a777c4e0cd247407

    • SSDEEP

      1536:Loaj1hJL1S9t0MIeboal8bCKxo7h0RPLJNz30rtriCr0nJnHPoq1nouy8TRgd:c0hpgz6xGhYJF30Blr0nhoutTRgd

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks