General

  • Target

    e345c7232badd34dcd327c6442bb72aa40211bfd6e5f84adc0f06f19a2c53fc2

  • Size

    79KB

  • Sample

    220130-aflkhabghr

  • MD5

    019a5f531f324d5528ccc09faa617f42

  • SHA1

    c3be3a8a181f5b26fe816effe8c90453e3fd6278

  • SHA256

    e345c7232badd34dcd327c6442bb72aa40211bfd6e5f84adc0f06f19a2c53fc2

  • SHA512

    1fd0759d49b3867282b6a5eef50bb23e77e1c7df80ebedaf2e69a7d12ad104317fefa494288d8240dbe7fb9a71240632e23b1965376631fa737a8ce3d54a9d89

Malware Config

Targets

    • Target

      e345c7232badd34dcd327c6442bb72aa40211bfd6e5f84adc0f06f19a2c53fc2

    • Size

      79KB

    • MD5

      019a5f531f324d5528ccc09faa617f42

    • SHA1

      c3be3a8a181f5b26fe816effe8c90453e3fd6278

    • SHA256

      e345c7232badd34dcd327c6442bb72aa40211bfd6e5f84adc0f06f19a2c53fc2

    • SHA512

      1fd0759d49b3867282b6a5eef50bb23e77e1c7df80ebedaf2e69a7d12ad104317fefa494288d8240dbe7fb9a71240632e23b1965376631fa737a8ce3d54a9d89

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks