General

  • Target

    8488070e530e8c3b187920318f13bdf8de0e58199aecd69057ff7e87d3fd25bb

  • Size

    89KB

  • Sample

    220130-v6aadagcb7

  • MD5

    6bdf4e5b35b4cc5d3d519edc67086d7f

  • SHA1

    38d25754e13a219d0d8b3d6d0eefed18ff81af99

  • SHA256

    8488070e530e8c3b187920318f13bdf8de0e58199aecd69057ff7e87d3fd25bb

  • SHA512

    75a49a6e9552408be36abd514f2ed5428ba5ecc2ba4da7ce53d29297862dfff58f94608d872104ecab7f1bbb6b388515a744724bde6cbef1bde27b7b219a723b

Malware Config

Targets

    • Target

      8488070e530e8c3b187920318f13bdf8de0e58199aecd69057ff7e87d3fd25bb

    • Size

      89KB

    • MD5

      6bdf4e5b35b4cc5d3d519edc67086d7f

    • SHA1

      38d25754e13a219d0d8b3d6d0eefed18ff81af99

    • SHA256

      8488070e530e8c3b187920318f13bdf8de0e58199aecd69057ff7e87d3fd25bb

    • SHA512

      75a49a6e9552408be36abd514f2ed5428ba5ecc2ba4da7ce53d29297862dfff58f94608d872104ecab7f1bbb6b388515a744724bde6cbef1bde27b7b219a723b

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks