General

  • Target

    834b4e2cb213740f4bde30273c12c4e6e1aeeb6d9f61f100bac0a68731d25681

  • Size

    89KB

  • Sample

    220130-w72lpahcb7

  • MD5

    5a843bc0b9f4525b1ee512e1eba95641

  • SHA1

    b74c828dc6f726c42e92e660294f9c549a244b7e

  • SHA256

    834b4e2cb213740f4bde30273c12c4e6e1aeeb6d9f61f100bac0a68731d25681

  • SHA512

    32e60201eb43a5e52b66564d10d904e4a847cd5ca13bf7321860ecae81bfba1e76863f3abfa1f02ee05dab4f0b78ec0640d85f6ba06dd52c7f60e1afab871696

Malware Config

Targets

    • Target

      834b4e2cb213740f4bde30273c12c4e6e1aeeb6d9f61f100bac0a68731d25681

    • Size

      89KB

    • MD5

      5a843bc0b9f4525b1ee512e1eba95641

    • SHA1

      b74c828dc6f726c42e92e660294f9c549a244b7e

    • SHA256

      834b4e2cb213740f4bde30273c12c4e6e1aeeb6d9f61f100bac0a68731d25681

    • SHA512

      32e60201eb43a5e52b66564d10d904e4a847cd5ca13bf7321860ecae81bfba1e76863f3abfa1f02ee05dab4f0b78ec0640d85f6ba06dd52c7f60e1afab871696

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks