General

  • Target

    dcd0cd6c316c5963180a7d6d61a271560591a92257c481397af3563853732e03

  • Size

    89KB

  • Sample

    220130-rtz4gsdag6

  • MD5

    77a25486d425825986d2c6306a61f637

  • SHA1

    b01caf62c20ef1f2dae0257dee8bae8c4b01bde0

  • SHA256

    dcd0cd6c316c5963180a7d6d61a271560591a92257c481397af3563853732e03

  • SHA512

    6eabb344549701a886d72ef6121de85c2f1683804eee7404ac72afdb6c9f8189a9b25feb4d230eb7e8e524ecd2b3b7b354ec493cc924973be96c7482f34932ab

Malware Config

Targets

    • Target

      dcd0cd6c316c5963180a7d6d61a271560591a92257c481397af3563853732e03

    • Size

      89KB

    • MD5

      77a25486d425825986d2c6306a61f637

    • SHA1

      b01caf62c20ef1f2dae0257dee8bae8c4b01bde0

    • SHA256

      dcd0cd6c316c5963180a7d6d61a271560591a92257c481397af3563853732e03

    • SHA512

      6eabb344549701a886d72ef6121de85c2f1683804eee7404ac72afdb6c9f8189a9b25feb4d230eb7e8e524ecd2b3b7b354ec493cc924973be96c7482f34932ab

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks