General

  • Target

    8d1c5699b7d49a787ed0c43b51e887ad8738b499f8d6f1a8b811566859827dd1

  • Size

    92KB

  • Sample

    220122-abjv4sedfn

  • MD5

    f1eb2a68d5d438e93a22b2126c812f4d

  • SHA1

    cdf92217a600be39b672e7160bf966c315106f13

  • SHA256

    8d1c5699b7d49a787ed0c43b51e887ad8738b499f8d6f1a8b811566859827dd1

  • SHA512

    a605f5199ab60f7b68d05c48dc4fb1f3467658175b267fde7bf3056ca6c47babf25ef7f7f51b70203af050d6e8618d29c846514a9485db1ae2eda313251b86f6

Malware Config

Targets

    • Target

      8d1c5699b7d49a787ed0c43b51e887ad8738b499f8d6f1a8b811566859827dd1

    • Size

      92KB

    • MD5

      f1eb2a68d5d438e93a22b2126c812f4d

    • SHA1

      cdf92217a600be39b672e7160bf966c315106f13

    • SHA256

      8d1c5699b7d49a787ed0c43b51e887ad8738b499f8d6f1a8b811566859827dd1

    • SHA512

      a605f5199ab60f7b68d05c48dc4fb1f3467658175b267fde7bf3056ca6c47babf25ef7f7f51b70203af050d6e8618d29c846514a9485db1ae2eda313251b86f6

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks