General

  • Target

    681c792dfc004c217b8727465fd92aa1f5661e5d4dc7b0ab9bc4bbfebd93730f

  • Size

    89KB

  • Sample

    220130-vs3prsfhh2

  • MD5

    71bbd661a61e0fee1f248f303af06f3f

  • SHA1

    2202b0f53e60ad356226541af56ad87f04d16ed6

  • SHA256

    681c792dfc004c217b8727465fd92aa1f5661e5d4dc7b0ab9bc4bbfebd93730f

  • SHA512

    6ced818d1a4aeb1f03525b3b39ad80457a75593da161f0b5ac10f86a41eccd537f901a493fd4f51a21d42997cb3b50ddb3ee7b039d955a4c3928fd2ea11038e9

Malware Config

Targets

    • Target

      681c792dfc004c217b8727465fd92aa1f5661e5d4dc7b0ab9bc4bbfebd93730f

    • Size

      89KB

    • MD5

      71bbd661a61e0fee1f248f303af06f3f

    • SHA1

      2202b0f53e60ad356226541af56ad87f04d16ed6

    • SHA256

      681c792dfc004c217b8727465fd92aa1f5661e5d4dc7b0ab9bc4bbfebd93730f

    • SHA512

      6ced818d1a4aeb1f03525b3b39ad80457a75593da161f0b5ac10f86a41eccd537f901a493fd4f51a21d42997cb3b50ddb3ee7b039d955a4c3928fd2ea11038e9

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks