General

  • Target

    66ea6ef60609d429ce73786ea4b3d468792fa039da34190d8b315500b4ebb845

  • Size

    89KB

  • Sample

    220130-w4nknahbe3

  • MD5

    5bb780344a601f4eff9ce0c55daf4361

  • SHA1

    0f9cc14064eb24ddef5fc68766c24664fab0ce1b

  • SHA256

    66ea6ef60609d429ce73786ea4b3d468792fa039da34190d8b315500b4ebb845

  • SHA512

    f2cf0f570f117dba80e4ebde248a91f620fca1dc938d66cac50c0d67e9ec4a46fb2e5894de3b3d9ba82c910108d5096f7d66b20130865687cfcef07bd9a8ca89

Malware Config

Targets

    • Target

      66ea6ef60609d429ce73786ea4b3d468792fa039da34190d8b315500b4ebb845

    • Size

      89KB

    • MD5

      5bb780344a601f4eff9ce0c55daf4361

    • SHA1

      0f9cc14064eb24ddef5fc68766c24664fab0ce1b

    • SHA256

      66ea6ef60609d429ce73786ea4b3d468792fa039da34190d8b315500b4ebb845

    • SHA512

      f2cf0f570f117dba80e4ebde248a91f620fca1dc938d66cac50c0d67e9ec4a46fb2e5894de3b3d9ba82c910108d5096f7d66b20130865687cfcef07bd9a8ca89

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks