General

  • Target

    e82d2260eb5621df67eb68f134bec2e0647cb01ac1284b01a8f79ade27777039

  • Size

    89KB

  • Sample

    220130-y2c29aaga6

  • MD5

    421bff8f5dd218727283a2914424eccc

  • SHA1

    7d639cea8bd8ff7fe3f1406f3590ea6ec1f6e810

  • SHA256

    e82d2260eb5621df67eb68f134bec2e0647cb01ac1284b01a8f79ade27777039

  • SHA512

    6778a73de132fd64c192a98192553e070c92aea18ba65a642bb3f7eddd5122dc9051c01aac83bf752a10dc4ead8d0a8137808470a94bd28588c22b8182e4c2f7

Malware Config

Targets

    • Target

      e82d2260eb5621df67eb68f134bec2e0647cb01ac1284b01a8f79ade27777039

    • Size

      89KB

    • MD5

      421bff8f5dd218727283a2914424eccc

    • SHA1

      7d639cea8bd8ff7fe3f1406f3590ea6ec1f6e810

    • SHA256

      e82d2260eb5621df67eb68f134bec2e0647cb01ac1284b01a8f79ade27777039

    • SHA512

      6778a73de132fd64c192a98192553e070c92aea18ba65a642bb3f7eddd5122dc9051c01aac83bf752a10dc4ead8d0a8137808470a94bd28588c22b8182e4c2f7

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks