General

  • Target

    a767ee10d044d2663292a649aaddbf7e373f9fb319e5766121b49939a981d4c5

  • Size

    89KB

  • Sample

    220122-bevx8agad7

  • MD5

    ae55d7b5c3d3bc7ed338d40ada25902f

  • SHA1

    97c8d511d32e2ab7ff7d78f90bedbf2f31c14bb1

  • SHA256

    a767ee10d044d2663292a649aaddbf7e373f9fb319e5766121b49939a981d4c5

  • SHA512

    334510879a1b9d5e1d4aa862c07518eed5e2742422254c7a833534b746fdcfa193d440fcdb15113ade9c461337083f56fea0a3c5bcfebe0ab3bccc9e1cc46ee3

Malware Config

Targets

    • Target

      a767ee10d044d2663292a649aaddbf7e373f9fb319e5766121b49939a981d4c5

    • Size

      89KB

    • MD5

      ae55d7b5c3d3bc7ed338d40ada25902f

    • SHA1

      97c8d511d32e2ab7ff7d78f90bedbf2f31c14bb1

    • SHA256

      a767ee10d044d2663292a649aaddbf7e373f9fb319e5766121b49939a981d4c5

    • SHA512

      334510879a1b9d5e1d4aa862c07518eed5e2742422254c7a833534b746fdcfa193d440fcdb15113ade9c461337083f56fea0a3c5bcfebe0ab3bccc9e1cc46ee3

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks