General

  • Target

    20f25b29416e2df84ca30a749e1d3382f0df84d24a6e72029f065f79445158a1

  • Size

    79KB

  • Sample

    220130-2y4mkscdh4

  • MD5

    67fceab90a142e1e286bca0922dbffd3

  • SHA1

    4da530701e92158c497b4e8ef61de4479689763e

  • SHA256

    20f25b29416e2df84ca30a749e1d3382f0df84d24a6e72029f065f79445158a1

  • SHA512

    5881392229931158c8ea5b33321fe24d703a82c9c64ecb889261b4ec8b46ced9dd0d652c6b4fd414cd70f23b10f702e506333beb24a616bbd4d3e58201e48ef7

Malware Config

Targets

    • Target

      20f25b29416e2df84ca30a749e1d3382f0df84d24a6e72029f065f79445158a1

    • Size

      79KB

    • MD5

      67fceab90a142e1e286bca0922dbffd3

    • SHA1

      4da530701e92158c497b4e8ef61de4479689763e

    • SHA256

      20f25b29416e2df84ca30a749e1d3382f0df84d24a6e72029f065f79445158a1

    • SHA512

      5881392229931158c8ea5b33321fe24d703a82c9c64ecb889261b4ec8b46ced9dd0d652c6b4fd414cd70f23b10f702e506333beb24a616bbd4d3e58201e48ef7

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks