General

  • Target

    757b9ce02f954e646c803bf402bbdc697c642049e1730e4822db5e7864a1cce6

  • Size

    79KB

  • Sample

    220130-2rkwwsbfbj

  • MD5

    b6b3e7b18384bb632602662a7f559bcd

  • SHA1

    e791e376afa6b555727ed534a69f85bfc0a744b5

  • SHA256

    757b9ce02f954e646c803bf402bbdc697c642049e1730e4822db5e7864a1cce6

  • SHA512

    047258a417cf7a6d7305b6b657809aec2ab223cc58159e125f930effa93f1440c50acf8d205dd767245153dc066904eaca038519db2ddf0d3ae3e188fde4a071

Malware Config

Targets

    • Target

      757b9ce02f954e646c803bf402bbdc697c642049e1730e4822db5e7864a1cce6

    • Size

      79KB

    • MD5

      b6b3e7b18384bb632602662a7f559bcd

    • SHA1

      e791e376afa6b555727ed534a69f85bfc0a744b5

    • SHA256

      757b9ce02f954e646c803bf402bbdc697c642049e1730e4822db5e7864a1cce6

    • SHA512

      047258a417cf7a6d7305b6b657809aec2ab223cc58159e125f930effa93f1440c50acf8d205dd767245153dc066904eaca038519db2ddf0d3ae3e188fde4a071

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks