General

  • Target

    ada21030c1ba9014e72f08de9974b947091bec01855411743042f75c81d4f2b3

  • Size

    89KB

  • Sample

    220130-31njtadaf5

  • MD5

    2ff61b170821191c99d8b75bd01726f2

  • SHA1

    320cf1c0efad979d0028f504f7274bbc7790fdde

  • SHA256

    ada21030c1ba9014e72f08de9974b947091bec01855411743042f75c81d4f2b3

  • SHA512

    c66e64652cef2fe5fee8dcf71742aa25389627eff4eee1d7e6270d41e01a62c286b74e7bf04aa496af94aad182cde292358e249f17e6704c9d17cbc9df51b517

Malware Config

Targets

    • Target

      ada21030c1ba9014e72f08de9974b947091bec01855411743042f75c81d4f2b3

    • Size

      89KB

    • MD5

      2ff61b170821191c99d8b75bd01726f2

    • SHA1

      320cf1c0efad979d0028f504f7274bbc7790fdde

    • SHA256

      ada21030c1ba9014e72f08de9974b947091bec01855411743042f75c81d4f2b3

    • SHA512

      c66e64652cef2fe5fee8dcf71742aa25389627eff4eee1d7e6270d41e01a62c286b74e7bf04aa496af94aad182cde292358e249f17e6704c9d17cbc9df51b517

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks