General

  • Target

    fd77f52378bc09a2b93c2a78af45925c8b9db53c5c6a5a378c3f4a54008d0802

  • Size

    89KB

  • Sample

    220130-qkvlzacbg9

  • MD5

    8b52cd1df70ef315bce38223ac7f4ec3

  • SHA1

    d687cb101346c2f1f480dc4932fe8b6fe94c0e5c

  • SHA256

    fd77f52378bc09a2b93c2a78af45925c8b9db53c5c6a5a378c3f4a54008d0802

  • SHA512

    f6f7ca374421f52dc1ac800c21ecdbd6d1677fdc9cecb2b2cb3708f5f71d1377dae8ab468c438492492aea1a6fe144b620e91e701126111f3a1c88902383e8bb

Malware Config

Targets

    • Target

      fd77f52378bc09a2b93c2a78af45925c8b9db53c5c6a5a378c3f4a54008d0802

    • Size

      89KB

    • MD5

      8b52cd1df70ef315bce38223ac7f4ec3

    • SHA1

      d687cb101346c2f1f480dc4932fe8b6fe94c0e5c

    • SHA256

      fd77f52378bc09a2b93c2a78af45925c8b9db53c5c6a5a378c3f4a54008d0802

    • SHA512

      f6f7ca374421f52dc1ac800c21ecdbd6d1677fdc9cecb2b2cb3708f5f71d1377dae8ab468c438492492aea1a6fe144b620e91e701126111f3a1c88902383e8bb

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks