General

  • Target

    b719bca6ade9b83bbadd435e49f5a7c43e586b112ac3f342ca37daaa01ace9bb

  • Size

    89KB

  • Sample

    220130-y3qpqsagc7

  • MD5

    416e831d583665352fe16fe9232d36cf

  • SHA1

    50e7b4d4f3ab5fa9c77c0286213e7980ed52f6f6

  • SHA256

    b719bca6ade9b83bbadd435e49f5a7c43e586b112ac3f342ca37daaa01ace9bb

  • SHA512

    49ce4109c6564507c44ff2b6881d560522900a2e564fce834e9a645d526d0853288ca5a4c348caf4570ef03eee2a26fee263de06a3f23f1979cb532f82399cc0

Malware Config

Targets

    • Target

      b719bca6ade9b83bbadd435e49f5a7c43e586b112ac3f342ca37daaa01ace9bb

    • Size

      89KB

    • MD5

      416e831d583665352fe16fe9232d36cf

    • SHA1

      50e7b4d4f3ab5fa9c77c0286213e7980ed52f6f6

    • SHA256

      b719bca6ade9b83bbadd435e49f5a7c43e586b112ac3f342ca37daaa01ace9bb

    • SHA512

      49ce4109c6564507c44ff2b6881d560522900a2e564fce834e9a645d526d0853288ca5a4c348caf4570ef03eee2a26fee263de06a3f23f1979cb532f82399cc0

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks