General

  • Target

    0b0353e60dd9109b6cf489e089dc574f3c9a9ed2c370a7b3a7bfb4d7156927b9N.exe

  • Size

    43KB

  • Sample

    250109-bwxs5svlen

  • MD5

    4e53cbe5a1dac7080ac6ad88196f43f0

  • SHA1

    b6b7ccab87c011f479f9252310068187899bc7c5

  • SHA256

    0b0353e60dd9109b6cf489e089dc574f3c9a9ed2c370a7b3a7bfb4d7156927b9

  • SHA512

    db011864a6c4c4a0a896bc1a69771f498c544d0711dd930731ece90ea484fbde61a3d9936205b47cc5e4cab66f9fc855178b6f716f48da7d01034a1d421aae5b

  • SSDEEP

    768:+U9XnKJv8KrtPNxT4oreP7cIK3yQpdk6x8pf9m4P/S0hVvIZiGDZ6RO8nHE8taq6:+U9abrtX4oocIK3yQkaY9z/S0hhy6k8U

Malware Config

Targets

    • Target

      0b0353e60dd9109b6cf489e089dc574f3c9a9ed2c370a7b3a7bfb4d7156927b9N.exe

    • Size

      43KB

    • MD5

      4e53cbe5a1dac7080ac6ad88196f43f0

    • SHA1

      b6b7ccab87c011f479f9252310068187899bc7c5

    • SHA256

      0b0353e60dd9109b6cf489e089dc574f3c9a9ed2c370a7b3a7bfb4d7156927b9

    • SHA512

      db011864a6c4c4a0a896bc1a69771f498c544d0711dd930731ece90ea484fbde61a3d9936205b47cc5e4cab66f9fc855178b6f716f48da7d01034a1d421aae5b

    • SSDEEP

      768:+U9XnKJv8KrtPNxT4oreP7cIK3yQpdk6x8pf9m4P/S0hVvIZiGDZ6RO8nHE8taq6:+U9abrtX4oocIK3yQkaY9z/S0hhy6k8U

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks