General

  • Target

    72a41b7053c5c1dc1cb1aed743fede7fbbaf2c6a6c97c10c38e0d08a06b3ad69

  • Size

    43KB

  • Sample

    250216-a8xhgatnay

  • MD5

    9d56cf46bfd14cfe34081bae570fc72d

  • SHA1

    181c0429d1708f78b30efff964b61c935acad16d

  • SHA256

    72a41b7053c5c1dc1cb1aed743fede7fbbaf2c6a6c97c10c38e0d08a06b3ad69

  • SHA512

    83f922c860c002ad442d7d659b4c05bf28342a76b6e118bf3a8232c63aa0d96ea8c6f87aae21bc83f1389ba104048f9954c8f21aa39ca3bb3cededd3e271b254

  • SSDEEP

    768:+U9XnKJv8KrtPNxT4oreP7cIK3yQpdk6x8pf9m4P/S0hVvIZiGDZ6RO8nHE8taqY:+U9abrtX4oocIK3yQkaY9z/S0hhy6k8C

Malware Config

Targets

    • Target

      72a41b7053c5c1dc1cb1aed743fede7fbbaf2c6a6c97c10c38e0d08a06b3ad69

    • Size

      43KB

    • MD5

      9d56cf46bfd14cfe34081bae570fc72d

    • SHA1

      181c0429d1708f78b30efff964b61c935acad16d

    • SHA256

      72a41b7053c5c1dc1cb1aed743fede7fbbaf2c6a6c97c10c38e0d08a06b3ad69

    • SHA512

      83f922c860c002ad442d7d659b4c05bf28342a76b6e118bf3a8232c63aa0d96ea8c6f87aae21bc83f1389ba104048f9954c8f21aa39ca3bb3cededd3e271b254

    • SSDEEP

      768:+U9XnKJv8KrtPNxT4oreP7cIK3yQpdk6x8pf9m4P/S0hVvIZiGDZ6RO8nHE8taqY:+U9abrtX4oocIK3yQkaY9z/S0hhy6k8C

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks