General

  • Target

    b63955bd705af691ec8e8e62e25eb59f786fb00aea99df7ce4f39bd1f322e7b0.exe

  • Size

    43KB

  • Sample

    250121-mkwmgszkdq

  • MD5

    7cd082c8c8e24ed30649c358c21a7151

  • SHA1

    1d8f1137c074a0aa9d4e94ff9cb8e1716adfed33

  • SHA256

    b63955bd705af691ec8e8e62e25eb59f786fb00aea99df7ce4f39bd1f322e7b0

  • SHA512

    03ceeca4dd5db45a9344a1c42336e1ad885e20c10c5417bf396222297b7df56115cfa65012d5bfa1a4d26077bf4704a7e9d42d953ef65dabb4fba33cab7bb7d1

  • SSDEEP

    768:+U9XnKJv8KrtPNxT4oreP7cIK3yQpdk6x8pf9m4P/S0hVvIZiGDZ6RO8nHE8taqr:+U9abrtX4oocIK3yQkaY9z/S0hhy6k85

Malware Config

Targets

    • Target

      b63955bd705af691ec8e8e62e25eb59f786fb00aea99df7ce4f39bd1f322e7b0.exe

    • Size

      43KB

    • MD5

      7cd082c8c8e24ed30649c358c21a7151

    • SHA1

      1d8f1137c074a0aa9d4e94ff9cb8e1716adfed33

    • SHA256

      b63955bd705af691ec8e8e62e25eb59f786fb00aea99df7ce4f39bd1f322e7b0

    • SHA512

      03ceeca4dd5db45a9344a1c42336e1ad885e20c10c5417bf396222297b7df56115cfa65012d5bfa1a4d26077bf4704a7e9d42d953ef65dabb4fba33cab7bb7d1

    • SSDEEP

      768:+U9XnKJv8KrtPNxT4oreP7cIK3yQpdk6x8pf9m4P/S0hVvIZiGDZ6RO8nHE8taqr:+U9abrtX4oocIK3yQkaY9z/S0hhy6k85

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks