General

  • Target

    55c76d8bdfe72a271273aa3f6dcf71633406672a779e2a6fcf6dc693d474c471

  • Size

    89KB

  • Sample

    220122-bw7cksghe2

  • MD5

    9526e4abcacc4e4a55fa1b2fc2313123

  • SHA1

    bc1f4b637f422895caf626e5f4fa8c9757acca86

  • SHA256

    55c76d8bdfe72a271273aa3f6dcf71633406672a779e2a6fcf6dc693d474c471

  • SHA512

    c866dc6c62257bc7a0982cfe712d7a7ac80c28d41aca4161e43c018d2868afe734f523d0083978c0f43b033b0ad2dcfea0bcf8d5f9d6f9beb2b287ed59592d64

Malware Config

Targets

    • Target

      55c76d8bdfe72a271273aa3f6dcf71633406672a779e2a6fcf6dc693d474c471

    • Size

      89KB

    • MD5

      9526e4abcacc4e4a55fa1b2fc2313123

    • SHA1

      bc1f4b637f422895caf626e5f4fa8c9757acca86

    • SHA256

      55c76d8bdfe72a271273aa3f6dcf71633406672a779e2a6fcf6dc693d474c471

    • SHA512

      c866dc6c62257bc7a0982cfe712d7a7ac80c28d41aca4161e43c018d2868afe734f523d0083978c0f43b033b0ad2dcfea0bcf8d5f9d6f9beb2b287ed59592d64

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks