General

  • Target

    8239d115f3453c5ff7cdafc7878c9842e14e768a38c00de2f8f45e18659ca951

  • Size

    89KB

  • Sample

    220130-1gagqsbfe4

  • MD5

    259ea5f6f3f1209de99d6eb27a301cb7

  • SHA1

    ceb0574487e52ddf6a7963e7647f9ad74a42e339

  • SHA256

    8239d115f3453c5ff7cdafc7878c9842e14e768a38c00de2f8f45e18659ca951

  • SHA512

    6c75dc9a9755546c0e7a8b9a8ba167cc05176760a8dbec26689d4955b9c72243b0e07131e4dc3237a8751b6d831a6015e0f0c04bc3abd050c9d67f55fcec07d7

Malware Config

Targets

    • Target

      8239d115f3453c5ff7cdafc7878c9842e14e768a38c00de2f8f45e18659ca951

    • Size

      89KB

    • MD5

      259ea5f6f3f1209de99d6eb27a301cb7

    • SHA1

      ceb0574487e52ddf6a7963e7647f9ad74a42e339

    • SHA256

      8239d115f3453c5ff7cdafc7878c9842e14e768a38c00de2f8f45e18659ca951

    • SHA512

      6c75dc9a9755546c0e7a8b9a8ba167cc05176760a8dbec26689d4955b9c72243b0e07131e4dc3237a8751b6d831a6015e0f0c04bc3abd050c9d67f55fcec07d7

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks