General

  • Target

    4e9d663bfecd6a9f5172c11bcc54d632615f9b8a24aa2985faade63e4be286f3

  • Size

    89KB

  • Sample

    220122-afjqxaebh6

  • MD5

    e9115f553ac156542dcd38042f45ec68

  • SHA1

    a36c2d74acc93140fc028fbba56e47a7bc5aeff4

  • SHA256

    4e9d663bfecd6a9f5172c11bcc54d632615f9b8a24aa2985faade63e4be286f3

  • SHA512

    a6528d51dfe0563329358a6d63f45a1b6424944c49f10aabecbd1112999789b4989cf78542d0253a453f2f4401ced97a30d95c42f87dba04ce13d3069ba66249

Malware Config

Targets

    • Target

      4e9d663bfecd6a9f5172c11bcc54d632615f9b8a24aa2985faade63e4be286f3

    • Size

      89KB

    • MD5

      e9115f553ac156542dcd38042f45ec68

    • SHA1

      a36c2d74acc93140fc028fbba56e47a7bc5aeff4

    • SHA256

      4e9d663bfecd6a9f5172c11bcc54d632615f9b8a24aa2985faade63e4be286f3

    • SHA512

      a6528d51dfe0563329358a6d63f45a1b6424944c49f10aabecbd1112999789b4989cf78542d0253a453f2f4401ced97a30d95c42f87dba04ce13d3069ba66249

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks