General

  • Target

    edd02d9c1ea5a797e884ca249364a133a88921753a8c01ab201b0ab3cc2093d0

  • Size

    79KB

  • Sample

    220121-31rlgadhd4

  • MD5

    f583a1fdb3c8be409e2118795ad916ba

  • SHA1

    f92214ff9b2970dc79272199051acf89980bdd4f

  • SHA256

    edd02d9c1ea5a797e884ca249364a133a88921753a8c01ab201b0ab3cc2093d0

  • SHA512

    a27ec24e0586fddca6f1e7d5e8f0eb322d34cd1ddfa64c805ddf2a7718e672fdc51baeec44cf7e25b23ab59d0d8a375881975caa0f24600166ba5f809b14a225

Malware Config

Targets

    • Target

      edd02d9c1ea5a797e884ca249364a133a88921753a8c01ab201b0ab3cc2093d0

    • Size

      79KB

    • MD5

      f583a1fdb3c8be409e2118795ad916ba

    • SHA1

      f92214ff9b2970dc79272199051acf89980bdd4f

    • SHA256

      edd02d9c1ea5a797e884ca249364a133a88921753a8c01ab201b0ab3cc2093d0

    • SHA512

      a27ec24e0586fddca6f1e7d5e8f0eb322d34cd1ddfa64c805ddf2a7718e672fdc51baeec44cf7e25b23ab59d0d8a375881975caa0f24600166ba5f809b14a225

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks