General

  • Target

    5ef197b347cbbc5e1710c61b6ed10da623d8e01766a2671886320d506e2f38d3

  • Size

    92KB

  • Sample

    220122-a9k6tsgbcl

  • MD5

    b7bd80dd344af7649b4fd6e9b7b5fd5c

  • SHA1

    7af79b82d78bdc60350fcd863a2c3de4a372f74a

  • SHA256

    5ef197b347cbbc5e1710c61b6ed10da623d8e01766a2671886320d506e2f38d3

  • SHA512

    c4be13b74e2ab688430c6adb01d365b1820dc21f062dce621b0bacc5ec1bd83fe04bb762a76b6c525f757d220466fd9c80455d07d91f6b4df143420535bc7908

Malware Config

Targets

    • Target

      5ef197b347cbbc5e1710c61b6ed10da623d8e01766a2671886320d506e2f38d3

    • Size

      92KB

    • MD5

      b7bd80dd344af7649b4fd6e9b7b5fd5c

    • SHA1

      7af79b82d78bdc60350fcd863a2c3de4a372f74a

    • SHA256

      5ef197b347cbbc5e1710c61b6ed10da623d8e01766a2671886320d506e2f38d3

    • SHA512

      c4be13b74e2ab688430c6adb01d365b1820dc21f062dce621b0bacc5ec1bd83fe04bb762a76b6c525f757d220466fd9c80455d07d91f6b4df143420535bc7908

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks