General

  • Target

    d38b123e7e026a9fc9af5b871a0fb3aab04df129bf41612c1f021127b77b347a

  • Size

    79KB

  • Sample

    220130-2sh4pabfcm

  • MD5

    af661cb478510d1d00dfdf1f2de4e817

  • SHA1

    a1262b8b6bef47c81042ebe70f57deb1fef4f4e7

  • SHA256

    d38b123e7e026a9fc9af5b871a0fb3aab04df129bf41612c1f021127b77b347a

  • SHA512

    0aceb9a557ec122dc0f112db487f052fabdb3adc98dc44bf9c7574653602eeb4a6a1642d85a0acb302a7e7286812ce4613aeafea7dd59c6eec23cf41897955a9

Malware Config

Targets

    • Target

      d38b123e7e026a9fc9af5b871a0fb3aab04df129bf41612c1f021127b77b347a

    • Size

      79KB

    • MD5

      af661cb478510d1d00dfdf1f2de4e817

    • SHA1

      a1262b8b6bef47c81042ebe70f57deb1fef4f4e7

    • SHA256

      d38b123e7e026a9fc9af5b871a0fb3aab04df129bf41612c1f021127b77b347a

    • SHA512

      0aceb9a557ec122dc0f112db487f052fabdb3adc98dc44bf9c7574653602eeb4a6a1642d85a0acb302a7e7286812ce4613aeafea7dd59c6eec23cf41897955a9

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks