General

  • Target

    8a819e450fbd2edc9716dbdea0f56bafc9dbb8274e502cdb9aff3f7c6bfd9b56

  • Size

    320KB

  • Sample

    220130-wa26ysfehl

  • MD5

    69314300da7a4a0e95be545b804565dd

  • SHA1

    514a30aef41f24b74e34225858863897c5220eb6

  • SHA256

    8a819e450fbd2edc9716dbdea0f56bafc9dbb8274e502cdb9aff3f7c6bfd9b56

  • SHA512

    1dc5cd0196ebd22b0b23a1908edc6af84bbd70827b0281b7a13387d191153c34c4e37c8449e8e91cf8585591f9d3bc8b3b8afdfc5786034cd7f9ecafe89037c0

Malware Config

Targets

    • Target

      8a819e450fbd2edc9716dbdea0f56bafc9dbb8274e502cdb9aff3f7c6bfd9b56

    • Size

      320KB

    • MD5

      69314300da7a4a0e95be545b804565dd

    • SHA1

      514a30aef41f24b74e34225858863897c5220eb6

    • SHA256

      8a819e450fbd2edc9716dbdea0f56bafc9dbb8274e502cdb9aff3f7c6bfd9b56

    • SHA512

      1dc5cd0196ebd22b0b23a1908edc6af84bbd70827b0281b7a13387d191153c34c4e37c8449e8e91cf8585591f9d3bc8b3b8afdfc5786034cd7f9ecafe89037c0

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks