General

  • Target

    c4172c6ac1e00bb82cce8ce000b3a199e5f65b0936bc5fb67f28e0d8fc34ded6

  • Size

    89KB

  • Sample

    220130-wazqtsgdb9

  • MD5

    69374e5bcb38a82ef60c97ec0569ded3

  • SHA1

    2baffb0df06fea13ea97658e200fcecd1ee346eb

  • SHA256

    c4172c6ac1e00bb82cce8ce000b3a199e5f65b0936bc5fb67f28e0d8fc34ded6

  • SHA512

    fe9fc743285242fef57aabf78d0d391ec32120c815ebb6240b439cdc28cd4080c736ad8ce7d2affddaf6fd61f57bc949947d6c4b3111e383efca4f52397a3c23

Malware Config

Targets

    • Target

      c4172c6ac1e00bb82cce8ce000b3a199e5f65b0936bc5fb67f28e0d8fc34ded6

    • Size

      89KB

    • MD5

      69374e5bcb38a82ef60c97ec0569ded3

    • SHA1

      2baffb0df06fea13ea97658e200fcecd1ee346eb

    • SHA256

      c4172c6ac1e00bb82cce8ce000b3a199e5f65b0936bc5fb67f28e0d8fc34ded6

    • SHA512

      fe9fc743285242fef57aabf78d0d391ec32120c815ebb6240b439cdc28cd4080c736ad8ce7d2affddaf6fd61f57bc949947d6c4b3111e383efca4f52397a3c23

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks