General

  • Target

    14bab3a5cf879883e3c61b31ba722519360eac9ba68016ecacc9ae611e898d38

  • Size

    89KB

  • Sample

    220130-wmj6xagfe5

  • MD5

    63ae83244a8d7ca1eef4e834eb0eb07f

  • SHA1

    36f79f828ce802cc2ed8dd37cae5247362fb11ea

  • SHA256

    14bab3a5cf879883e3c61b31ba722519360eac9ba68016ecacc9ae611e898d38

  • SHA512

    8a5ac6c6a16e703aaa56a982ce0d5afcb17ebf818c0faddae8bba4e5818f976fa6db15c6e5d49144c73fac3fab75bd5e3f991fb8fe624abffb266db30f6ebf82

Malware Config

Targets

    • Target

      14bab3a5cf879883e3c61b31ba722519360eac9ba68016ecacc9ae611e898d38

    • Size

      89KB

    • MD5

      63ae83244a8d7ca1eef4e834eb0eb07f

    • SHA1

      36f79f828ce802cc2ed8dd37cae5247362fb11ea

    • SHA256

      14bab3a5cf879883e3c61b31ba722519360eac9ba68016ecacc9ae611e898d38

    • SHA512

      8a5ac6c6a16e703aaa56a982ce0d5afcb17ebf818c0faddae8bba4e5818f976fa6db15c6e5d49144c73fac3fab75bd5e3f991fb8fe624abffb266db30f6ebf82

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks