General

  • Target

    cf35cfc4d6ec50fbaaf7d69f08688bc132a32aff6da71a72ccf254a2b8edaf9b

  • Size

    102KB

  • Sample

    250112-h8shhsvldn

  • MD5

    b0ca4c5df29d648be0ec9d95ad576cdf

  • SHA1

    13fcf504eed2eb69f36892adcb5c865a2519bc18

  • SHA256

    cf35cfc4d6ec50fbaaf7d69f08688bc132a32aff6da71a72ccf254a2b8edaf9b

  • SHA512

    9b5e2a4f7b59032ef298323848d4da81d5c0bbb64d12c330f2239aea6aa6df4ee439a0bf5cd70c00c0cadf47af27d511d456b4145bd6edad037d2a4a05a51825

  • SSDEEP

    1536:jJbCiJVkgMaT2itTkjoRXnM48dXFajVPkPLnlxsz30rtrQ393:tbfVk29te2juPLlxo30Bs393

Malware Config

Extracted

Family

sakula

C2

www.savmpet.com

Targets

    • Target

      cf35cfc4d6ec50fbaaf7d69f08688bc132a32aff6da71a72ccf254a2b8edaf9b

    • Size

      102KB

    • MD5

      b0ca4c5df29d648be0ec9d95ad576cdf

    • SHA1

      13fcf504eed2eb69f36892adcb5c865a2519bc18

    • SHA256

      cf35cfc4d6ec50fbaaf7d69f08688bc132a32aff6da71a72ccf254a2b8edaf9b

    • SHA512

      9b5e2a4f7b59032ef298323848d4da81d5c0bbb64d12c330f2239aea6aa6df4ee439a0bf5cd70c00c0cadf47af27d511d456b4145bd6edad037d2a4a05a51825

    • SSDEEP

      1536:jJbCiJVkgMaT2itTkjoRXnM48dXFajVPkPLnlxsz30rtrQ393:tbfVk29te2juPLlxo30Bs393

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks