General

  • Target

    169a60dfb8a869acab1156bd6dd0f2434f3564e7b163a9a4025a3d6ce5a00333N.exe

  • Size

    43KB

  • Sample

    250116-t3sf4szmdp

  • MD5

    e7d02fab3ac2384f120b39a047753170

  • SHA1

    6f3d959f0a65ad1accb9890385241e2120f61816

  • SHA256

    169a60dfb8a869acab1156bd6dd0f2434f3564e7b163a9a4025a3d6ce5a00333

  • SHA512

    e705016a2046fa658e17b4576620fa22230772528e98230cc9de8cb100ccbecc2b48ace548998f5278bd6d10b3b5e93600ac3f17acb4d824ac15450fbc34515e

  • SSDEEP

    768:+U9XnKJv8KrtPNxT4oreP7cIK3yQpdk6x8pf9m4P/S0hVvIZiGDZ6RO8nHE8taqa:+U9abrtX4oocIK3yQkaY9z/S0hhy6k8A

Malware Config

Targets

    • Target

      169a60dfb8a869acab1156bd6dd0f2434f3564e7b163a9a4025a3d6ce5a00333N.exe

    • Size

      43KB

    • MD5

      e7d02fab3ac2384f120b39a047753170

    • SHA1

      6f3d959f0a65ad1accb9890385241e2120f61816

    • SHA256

      169a60dfb8a869acab1156bd6dd0f2434f3564e7b163a9a4025a3d6ce5a00333

    • SHA512

      e705016a2046fa658e17b4576620fa22230772528e98230cc9de8cb100ccbecc2b48ace548998f5278bd6d10b3b5e93600ac3f17acb4d824ac15450fbc34515e

    • SSDEEP

      768:+U9XnKJv8KrtPNxT4oreP7cIK3yQpdk6x8pf9m4P/S0hVvIZiGDZ6RO8nHE8taqa:+U9abrtX4oocIK3yQkaY9z/S0hhy6k8A

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks