General

  • Target

    9f26d5664f77b4bfc297f64b374a44e08d34927f014978ca24e7707f7436a71d

  • Size

    89KB

  • Sample

    220122-bgl34agbd4

  • MD5

    ab557f2197647aa3fb7be3de8770a109

  • SHA1

    6ab179329707b60a305c5f348d9762349e87927b

  • SHA256

    9f26d5664f77b4bfc297f64b374a44e08d34927f014978ca24e7707f7436a71d

  • SHA512

    6bd77ca9b21a8bf5cc329b3f7f2ed5e01b8fe3b5ee4e486e60eb2dd9f5c5e4a7918d82c9dc124c8c375f2db90b35521a781c4b0c50e1fc2d1ab0d126617ed0c6

Malware Config

Targets

    • Target

      9f26d5664f77b4bfc297f64b374a44e08d34927f014978ca24e7707f7436a71d

    • Size

      89KB

    • MD5

      ab557f2197647aa3fb7be3de8770a109

    • SHA1

      6ab179329707b60a305c5f348d9762349e87927b

    • SHA256

      9f26d5664f77b4bfc297f64b374a44e08d34927f014978ca24e7707f7436a71d

    • SHA512

      6bd77ca9b21a8bf5cc329b3f7f2ed5e01b8fe3b5ee4e486e60eb2dd9f5c5e4a7918d82c9dc124c8c375f2db90b35521a781c4b0c50e1fc2d1ab0d126617ed0c6

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks