General

  • Target

    0f4e7fac307de174c4b276a894bdfb2292bffdc29f8cf9d91daa5ca86ba7d7da

  • Size

    92KB

  • Sample

    220130-1md24sbaer

  • MD5

    23169a0a2eee3d12fde0f3efd2cd55f1

  • SHA1

    e86d76d944f1213f0c7c016b5eadb0e50b3d969e

  • SHA256

    0f4e7fac307de174c4b276a894bdfb2292bffdc29f8cf9d91daa5ca86ba7d7da

  • SHA512

    ab89490485f9aa812ba8242129dcc13e3f4a8f91f26b22c1bea45d77e15c392c46fc9805e58dffac181e123db5552bc3806d1d11b99e2159248df257f0a7a305

Malware Config

Targets

    • Target

      0f4e7fac307de174c4b276a894bdfb2292bffdc29f8cf9d91daa5ca86ba7d7da

    • Size

      92KB

    • MD5

      23169a0a2eee3d12fde0f3efd2cd55f1

    • SHA1

      e86d76d944f1213f0c7c016b5eadb0e50b3d969e

    • SHA256

      0f4e7fac307de174c4b276a894bdfb2292bffdc29f8cf9d91daa5ca86ba7d7da

    • SHA512

      ab89490485f9aa812ba8242129dcc13e3f4a8f91f26b22c1bea45d77e15c392c46fc9805e58dffac181e123db5552bc3806d1d11b99e2159248df257f0a7a305

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks