General

  • Target

    b6e361c3ca2ba8125e7179a31a2610b53505f3f2d756dfb3656f771c0d97dca2

  • Size

    92KB

  • Sample

    220122-adw88aeegq

  • MD5

    ec85830342217b5d03f6bd26a703ce1a

  • SHA1

    b63c0a89da5862f58068e10a7c9e2b624c98a9d3

  • SHA256

    b6e361c3ca2ba8125e7179a31a2610b53505f3f2d756dfb3656f771c0d97dca2

  • SHA512

    d8d5501127a888104e1a71b943f60926b0db7f9bfc4fabbb15a804d2490af74f0c65d50b9030d34da6ec124d55ddb6bc50ee784ee65ccac6ca2337c9c6985ec8

Malware Config

Targets

    • Target

      b6e361c3ca2ba8125e7179a31a2610b53505f3f2d756dfb3656f771c0d97dca2

    • Size

      92KB

    • MD5

      ec85830342217b5d03f6bd26a703ce1a

    • SHA1

      b63c0a89da5862f58068e10a7c9e2b624c98a9d3

    • SHA256

      b6e361c3ca2ba8125e7179a31a2610b53505f3f2d756dfb3656f771c0d97dca2

    • SHA512

      d8d5501127a888104e1a71b943f60926b0db7f9bfc4fabbb15a804d2490af74f0c65d50b9030d34da6ec124d55ddb6bc50ee784ee65ccac6ca2337c9c6985ec8

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks