General

  • Target

    e0267979056ce329e62796be9c9c8e16d1c7af9ef3d38545cf2cb417082cde07.exe

  • Size

    114KB

  • Sample

    250212-l4fjyawrfq

  • MD5

    97f643bb76cfe09eb6fe9f97ef04a5bb

  • SHA1

    5ec2f718f069ad3a7110d39fc9f0ffa68f22a9ad

  • SHA256

    e0267979056ce329e62796be9c9c8e16d1c7af9ef3d38545cf2cb417082cde07

  • SHA512

    58aaf9ce7a3d9d336520072ca044c1f1e0431d796c4278273645267a311050ef925e2e8222b2b02bda252e16d18f1a63b5ea540aa26f16c910be23f5b22cb1ba

  • SSDEEP

    1536:Loaj1hJL1S9t0MIeboal8bCKxo7h0RPLJNz30rtriCr0nJnHPoq1nouy8TRgK:c0hpgz6xGhYJF30Blr0nhoutTRgK

Malware Config

Targets

    • Target

      e0267979056ce329e62796be9c9c8e16d1c7af9ef3d38545cf2cb417082cde07.exe

    • Size

      114KB

    • MD5

      97f643bb76cfe09eb6fe9f97ef04a5bb

    • SHA1

      5ec2f718f069ad3a7110d39fc9f0ffa68f22a9ad

    • SHA256

      e0267979056ce329e62796be9c9c8e16d1c7af9ef3d38545cf2cb417082cde07

    • SHA512

      58aaf9ce7a3d9d336520072ca044c1f1e0431d796c4278273645267a311050ef925e2e8222b2b02bda252e16d18f1a63b5ea540aa26f16c910be23f5b22cb1ba

    • SSDEEP

      1536:Loaj1hJL1S9t0MIeboal8bCKxo7h0RPLJNz30rtriCr0nJnHPoq1nouy8TRgK:c0hpgz6xGhYJF30Blr0nhoutTRgK

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks