General

  • Target

    bd70e303b41292babbb3d3ce33500443e3b476e0424087d0831c1c9f0d83d8ed

  • Size

    89KB

  • Sample

    220130-q3skbscef9

  • MD5

    836a618341c6149e7c83e99755a7fd5f

  • SHA1

    dba5e9748d25603b6c1f2de8cef12c9ea03c302c

  • SHA256

    bd70e303b41292babbb3d3ce33500443e3b476e0424087d0831c1c9f0d83d8ed

  • SHA512

    a8d52b7b080b981e753f3cfc3c87bd5bc05ccd8ba7dfd197d965533be4bb4fe8ecd9e84a6984b53f3fcbc71bf9c94745772073bf9ad146b43342e3d7927a077a

Malware Config

Targets

    • Target

      bd70e303b41292babbb3d3ce33500443e3b476e0424087d0831c1c9f0d83d8ed

    • Size

      89KB

    • MD5

      836a618341c6149e7c83e99755a7fd5f

    • SHA1

      dba5e9748d25603b6c1f2de8cef12c9ea03c302c

    • SHA256

      bd70e303b41292babbb3d3ce33500443e3b476e0424087d0831c1c9f0d83d8ed

    • SHA512

      a8d52b7b080b981e753f3cfc3c87bd5bc05ccd8ba7dfd197d965533be4bb4fe8ecd9e84a6984b53f3fcbc71bf9c94745772073bf9ad146b43342e3d7927a077a

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks