General

  • Target

    71e0fba078adc470d9c1ba33afc12a60a7a56cbf6b146578f3ce6e422c4a99ca

  • Size

    89KB

  • Sample

    220122-achdnseag3

  • MD5

    ef855c88842821a15a80bbee00024817

  • SHA1

    5b28af3c34fd2eddd6e5a715142aa237d8cd0e20

  • SHA256

    71e0fba078adc470d9c1ba33afc12a60a7a56cbf6b146578f3ce6e422c4a99ca

  • SHA512

    4b51939a0f63ea5b1fc1402f907235f6e7c5d2f56db6680f69062322745db58fe9b681996f3c434d03954665c0ec1b78bdd5a7c208a556b06a64cb8e10b25610

Malware Config

Targets

    • Target

      71e0fba078adc470d9c1ba33afc12a60a7a56cbf6b146578f3ce6e422c4a99ca

    • Size

      89KB

    • MD5

      ef855c88842821a15a80bbee00024817

    • SHA1

      5b28af3c34fd2eddd6e5a715142aa237d8cd0e20

    • SHA256

      71e0fba078adc470d9c1ba33afc12a60a7a56cbf6b146578f3ce6e422c4a99ca

    • SHA512

      4b51939a0f63ea5b1fc1402f907235f6e7c5d2f56db6680f69062322745db58fe9b681996f3c434d03954665c0ec1b78bdd5a7c208a556b06a64cb8e10b25610

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks