General

  • Target

    690d93dc31bd580bac73371ac8ed27286b5684a5d8f62ffdcdba81bb47891463

  • Size

    79KB

  • Sample

    220130-2sm3msbfcn

  • MD5

    aeed29398ceb645213cf639a9f80367c

  • SHA1

    39951d5594d314aace6191e491c8dbaa2c2d69b3

  • SHA256

    690d93dc31bd580bac73371ac8ed27286b5684a5d8f62ffdcdba81bb47891463

  • SHA512

    32ab9527e1795a002c223c3b74d2aaaac822579cf3b251be46fb46ead25f9fd45a25010f6775592fa961a12486faf2d7a029e0ea3d72d3a51bd5de9ce8c39ebc

Malware Config

Targets

    • Target

      690d93dc31bd580bac73371ac8ed27286b5684a5d8f62ffdcdba81bb47891463

    • Size

      79KB

    • MD5

      aeed29398ceb645213cf639a9f80367c

    • SHA1

      39951d5594d314aace6191e491c8dbaa2c2d69b3

    • SHA256

      690d93dc31bd580bac73371ac8ed27286b5684a5d8f62ffdcdba81bb47891463

    • SHA512

      32ab9527e1795a002c223c3b74d2aaaac822579cf3b251be46fb46ead25f9fd45a25010f6775592fa961a12486faf2d7a029e0ea3d72d3a51bd5de9ce8c39ebc

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks