General

  • Target

    88dd93965cdb2eed912fe59d6d014309b8b1de08bd0471f6f60b275a5077a962

  • Size

    92KB

  • Sample

    220130-2ertnsbdfq

  • MD5

    1472fffe307ad13669420021f9a2c722

  • SHA1

    6fa088f9d4723693533fce1e0034726fd554753a

  • SHA256

    88dd93965cdb2eed912fe59d6d014309b8b1de08bd0471f6f60b275a5077a962

  • SHA512

    fc3b5afcf6531728cec3489e691468cf1bd7d7b8efa3e0b06a4dfcb1a35e8a5c0f5eaaecb0e1729658236875a1f685db769ef3064a1101a8cdcd34cc231c0d43

Malware Config

Targets

    • Target

      88dd93965cdb2eed912fe59d6d014309b8b1de08bd0471f6f60b275a5077a962

    • Size

      92KB

    • MD5

      1472fffe307ad13669420021f9a2c722

    • SHA1

      6fa088f9d4723693533fce1e0034726fd554753a

    • SHA256

      88dd93965cdb2eed912fe59d6d014309b8b1de08bd0471f6f60b275a5077a962

    • SHA512

      fc3b5afcf6531728cec3489e691468cf1bd7d7b8efa3e0b06a4dfcb1a35e8a5c0f5eaaecb0e1729658236875a1f685db769ef3064a1101a8cdcd34cc231c0d43

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks