General

  • Target

    099baab8695d559acbd74dd1645e97cbefe47ed04244aa57cf66410b031de7dc

  • Size

    89KB

  • Sample

    220130-xlvrpahef8

  • MD5

    5482deee917c374bab43dd83a4a6c722

  • SHA1

    92a984f289e24abae44c4237d09c9ff3a198783a

  • SHA256

    099baab8695d559acbd74dd1645e97cbefe47ed04244aa57cf66410b031de7dc

  • SHA512

    8596f9d2bba261d2f000b81b2f68a275b04f469143a02b9f61a401c4a04b625ddb7b03e4da4c85eb5f4fec3f07f53d3113256a0babfeae908e0cbbeb6a5e4492

Malware Config

Targets

    • Target

      099baab8695d559acbd74dd1645e97cbefe47ed04244aa57cf66410b031de7dc

    • Size

      89KB

    • MD5

      5482deee917c374bab43dd83a4a6c722

    • SHA1

      92a984f289e24abae44c4237d09c9ff3a198783a

    • SHA256

      099baab8695d559acbd74dd1645e97cbefe47ed04244aa57cf66410b031de7dc

    • SHA512

      8596f9d2bba261d2f000b81b2f68a275b04f469143a02b9f61a401c4a04b625ddb7b03e4da4c85eb5f4fec3f07f53d3113256a0babfeae908e0cbbeb6a5e4492

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks