General

  • Target

    407dc6affd7da3752952eda48104af0d53f7352d66f825726355d14c8622669f

  • Size

    35KB

  • Sample

    250115-3fq47s1lej

  • MD5

    1ef11575284337940cb48d34cb27aed7

  • SHA1

    2fdc961c6bf0942fb11f48844702305df5910e53

  • SHA256

    407dc6affd7da3752952eda48104af0d53f7352d66f825726355d14c8622669f

  • SHA512

    99185cb2f44ac2a2bdef983f71be02505b7dc302aaa6c3c66815eb3d124f0065633d6b5b7e8c376c6637867442717dd525f0c6ebfc4bed29abe5adc1eed30d1a

  • SSDEEP

    768:TwbYGCv4nuEcJpQK4TQbtKvXwXgA9lJJea+yGCJQqeWnAEv2647Dl:TwbYP4nuEApQK4TQbtY2gA9DX+ytBO3

Malware Config

Targets

    • Target

      407dc6affd7da3752952eda48104af0d53f7352d66f825726355d14c8622669f

    • Size

      35KB

    • MD5

      1ef11575284337940cb48d34cb27aed7

    • SHA1

      2fdc961c6bf0942fb11f48844702305df5910e53

    • SHA256

      407dc6affd7da3752952eda48104af0d53f7352d66f825726355d14c8622669f

    • SHA512

      99185cb2f44ac2a2bdef983f71be02505b7dc302aaa6c3c66815eb3d124f0065633d6b5b7e8c376c6637867442717dd525f0c6ebfc4bed29abe5adc1eed30d1a

    • SSDEEP

      768:TwbYGCv4nuEcJpQK4TQbtKvXwXgA9lJJea+yGCJQqeWnAEv2647Dl:TwbYP4nuEApQK4TQbtY2gA9DX+ytBO3

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks