General

  • Target

    ca0be5e647c22ccb4a7961650a9af062e80a445d5d4024d525b362eab312484f

  • Size

    89KB

  • Sample

    220130-1l936abgc6

  • MD5

    231d0bfe48388082f5769f3deef5bcab

  • SHA1

    340327e187f97485e16b2242a01fe3fdabd3fedb

  • SHA256

    ca0be5e647c22ccb4a7961650a9af062e80a445d5d4024d525b362eab312484f

  • SHA512

    6c8fd4a269b43c3b34dda2936cea46c22ed49466f3c199caae320faa0fd5677649809f4c58856b55b0e713a70fe27261d955ade7d99ca7092a91821c61a8e262

Malware Config

Targets

    • Target

      ca0be5e647c22ccb4a7961650a9af062e80a445d5d4024d525b362eab312484f

    • Size

      89KB

    • MD5

      231d0bfe48388082f5769f3deef5bcab

    • SHA1

      340327e187f97485e16b2242a01fe3fdabd3fedb

    • SHA256

      ca0be5e647c22ccb4a7961650a9af062e80a445d5d4024d525b362eab312484f

    • SHA512

      6c8fd4a269b43c3b34dda2936cea46c22ed49466f3c199caae320faa0fd5677649809f4c58856b55b0e713a70fe27261d955ade7d99ca7092a91821c61a8e262

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks