General

  • Target

    b48dff9eb8b13b208541e454f04ad30dd0fbef9b9982e7194e80dadbc682c8fe

  • Size

    89KB

  • Sample

    220122-bvzlcaggh8

  • MD5

    97479fa13d9b96da33cdb49749fc2baf

  • SHA1

    8a89a1cc1d9f7a1891e9523b80c21ac530554e66

  • SHA256

    b48dff9eb8b13b208541e454f04ad30dd0fbef9b9982e7194e80dadbc682c8fe

  • SHA512

    d6dd18a629e5f974132c80e83d3e033fb7fdbca026d101fa3dca9fb8270acc2efcbd9a360ee393fca42ea3e28d365165d523cb02b2d01a3ad05fec06667a8567

Malware Config

Targets

    • Target

      b48dff9eb8b13b208541e454f04ad30dd0fbef9b9982e7194e80dadbc682c8fe

    • Size

      89KB

    • MD5

      97479fa13d9b96da33cdb49749fc2baf

    • SHA1

      8a89a1cc1d9f7a1891e9523b80c21ac530554e66

    • SHA256

      b48dff9eb8b13b208541e454f04ad30dd0fbef9b9982e7194e80dadbc682c8fe

    • SHA512

      d6dd18a629e5f974132c80e83d3e033fb7fdbca026d101fa3dca9fb8270acc2efcbd9a360ee393fca42ea3e28d365165d523cb02b2d01a3ad05fec06667a8567

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks