General

  • Target

    57375c715fe06101d88029f3f54ad8e1059d55e1e886aa151ff38a5cbfa868fc

  • Size

    89KB

  • Sample

    220130-1pcxtsbgf5

  • MD5

    21ee6c85f431c2aa085b91ac0c86d27f

  • SHA1

    c2b9b78952575e8b6d4a66e9f31b611f10adc5e6

  • SHA256

    57375c715fe06101d88029f3f54ad8e1059d55e1e886aa151ff38a5cbfa868fc

  • SHA512

    4afd9a4f2c7ea67242da5d188afc48bbb05278bc0a3ad313807575a7a88590a777e4fe1d6104c3c197728d31fe31e0a0f31a3b03daf22eaa87a1c3c707f5318e

Malware Config

Targets

    • Target

      57375c715fe06101d88029f3f54ad8e1059d55e1e886aa151ff38a5cbfa868fc

    • Size

      89KB

    • MD5

      21ee6c85f431c2aa085b91ac0c86d27f

    • SHA1

      c2b9b78952575e8b6d4a66e9f31b611f10adc5e6

    • SHA256

      57375c715fe06101d88029f3f54ad8e1059d55e1e886aa151ff38a5cbfa868fc

    • SHA512

      4afd9a4f2c7ea67242da5d188afc48bbb05278bc0a3ad313807575a7a88590a777e4fe1d6104c3c197728d31fe31e0a0f31a3b03daf22eaa87a1c3c707f5318e

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks