General

  • Target

    2025-04-11_eddf025c78321b91f563ff1017d628ba_amadey_elex_rhadamanthys_sakula_smoke-loader

  • Size

    114KB

  • Sample

    250411-sskg3stly9

  • MD5

    eddf025c78321b91f563ff1017d628ba

  • SHA1

    e40904cd9c43f63fb3e6a30a501fd288ae32197c

  • SHA256

    87a88dbb109cef4ac3bed2f20f787e48a1d7ce510be0a2c335b0d0b1125765b9

  • SHA512

    38dbe29303068d571125e043b39e7f5bafc1b339aa0e926f3d72202d5f85921ab19377e535ea78b597eb2dd5cfd71111bf446e02db1a76564685a64a8ecb986a

  • SSDEEP

    1536:Loaj1hJL1S9t0MIeboal8bCKxo7h0RPLJNz30rtriCr0nJnHPoq1nouy8TRgJ:c0hpgz6xGhYJF30Blr0nhoutTRgJ

Malware Config

Targets

    • Target

      2025-04-11_eddf025c78321b91f563ff1017d628ba_amadey_elex_rhadamanthys_sakula_smoke-loader

    • Size

      114KB

    • MD5

      eddf025c78321b91f563ff1017d628ba

    • SHA1

      e40904cd9c43f63fb3e6a30a501fd288ae32197c

    • SHA256

      87a88dbb109cef4ac3bed2f20f787e48a1d7ce510be0a2c335b0d0b1125765b9

    • SHA512

      38dbe29303068d571125e043b39e7f5bafc1b339aa0e926f3d72202d5f85921ab19377e535ea78b597eb2dd5cfd71111bf446e02db1a76564685a64a8ecb986a

    • SSDEEP

      1536:Loaj1hJL1S9t0MIeboal8bCKxo7h0RPLJNz30rtriCr0nJnHPoq1nouy8TRgJ:c0hpgz6xGhYJF30Blr0nhoutTRgJ

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks