General

  • Target

    1e4d0b06a5da8ecc12d5f8006d77bc7fc4f5f093b2e7152aaee20a19420c175d.exe

  • Size

    114KB

  • Sample

    250212-kwx9cavldr

  • MD5

    3c5be05adf2aca4bddb5a0fbd71b3e30

  • SHA1

    b67458d4b1af2c950bac0a39fa36764532c6c4dd

  • SHA256

    1e4d0b06a5da8ecc12d5f8006d77bc7fc4f5f093b2e7152aaee20a19420c175d

  • SHA512

    6aceb813c7f0fe076bdc762844711aba56e7592e1dd22ce6277b7d0307ddccee8e44117a2f2791c07e6b386efeb37bbfe42893c19155307561d2431e21611142

  • SSDEEP

    1536:Loaj1hJL1S9t0MIeboal8bCKxo7h0RPLJNz30rtriCr0nJnHPoq1nouy8TRgj:c0hpgz6xGhYJF30Blr0nhoutTRgj

Malware Config

Targets

    • Target

      1e4d0b06a5da8ecc12d5f8006d77bc7fc4f5f093b2e7152aaee20a19420c175d.exe

    • Size

      114KB

    • MD5

      3c5be05adf2aca4bddb5a0fbd71b3e30

    • SHA1

      b67458d4b1af2c950bac0a39fa36764532c6c4dd

    • SHA256

      1e4d0b06a5da8ecc12d5f8006d77bc7fc4f5f093b2e7152aaee20a19420c175d

    • SHA512

      6aceb813c7f0fe076bdc762844711aba56e7592e1dd22ce6277b7d0307ddccee8e44117a2f2791c07e6b386efeb37bbfe42893c19155307561d2431e21611142

    • SSDEEP

      1536:Loaj1hJL1S9t0MIeboal8bCKxo7h0RPLJNz30rtriCr0nJnHPoq1nouy8TRgj:c0hpgz6xGhYJF30Blr0nhoutTRgj

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks