General

  • Target

    22f5fa60c2286e22bee79bcde6e9c7ee80b42ef308c6bb7aed6d6163e5da0214

  • Size

    92KB

  • Sample

    220130-14ed7sbcdl

  • MD5

    191696982f3f21a6ac31bf3549c94108

  • SHA1

    b28806efad1136d03a4e6f34ed9d826fd828b535

  • SHA256

    22f5fa60c2286e22bee79bcde6e9c7ee80b42ef308c6bb7aed6d6163e5da0214

  • SHA512

    aa6d79fbce14f68e47dd7719e7dcb688dfd72b63db4e8ad3976351494df7221684621468380828c1aeca9f77c1156c8317524ee972696225c0d9be0dde8815ee

Malware Config

Targets

    • Target

      22f5fa60c2286e22bee79bcde6e9c7ee80b42ef308c6bb7aed6d6163e5da0214

    • Size

      92KB

    • MD5

      191696982f3f21a6ac31bf3549c94108

    • SHA1

      b28806efad1136d03a4e6f34ed9d826fd828b535

    • SHA256

      22f5fa60c2286e22bee79bcde6e9c7ee80b42ef308c6bb7aed6d6163e5da0214

    • SHA512

      aa6d79fbce14f68e47dd7719e7dcb688dfd72b63db4e8ad3976351494df7221684621468380828c1aeca9f77c1156c8317524ee972696225c0d9be0dde8815ee

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks