General

  • Target

    0077d0dd944fa58b096712a8736906ce84f1bd11c368dcceb51333de51ba7ab4

  • Size

    89KB

  • Sample

    220122-ab3yzseae2

  • MD5

    f06b0ee07daa7f914dec27f98a6d8850

  • SHA1

    abd40af6745f6cfa51210f88beafa6e0d4340b99

  • SHA256

    0077d0dd944fa58b096712a8736906ce84f1bd11c368dcceb51333de51ba7ab4

  • SHA512

    fdb0a5adb5331aa6f482440c77b8a4e61333f6e08fe358247a3570084aebe66f742630bd4fde126368577149e0a51181956d37162cae09528b984ae3e8b9962d

Malware Config

Targets

    • Target

      0077d0dd944fa58b096712a8736906ce84f1bd11c368dcceb51333de51ba7ab4

    • Size

      89KB

    • MD5

      f06b0ee07daa7f914dec27f98a6d8850

    • SHA1

      abd40af6745f6cfa51210f88beafa6e0d4340b99

    • SHA256

      0077d0dd944fa58b096712a8736906ce84f1bd11c368dcceb51333de51ba7ab4

    • SHA512

      fdb0a5adb5331aa6f482440c77b8a4e61333f6e08fe358247a3570084aebe66f742630bd4fde126368577149e0a51181956d37162cae09528b984ae3e8b9962d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks