General

  • Target

    9a2a8d85677aba13c8b287580601052c9156f7d37a8e8b9d9ba4c6453f048537

  • Size

    320KB

  • Sample

    220130-zkw98sbbc7

  • MD5

    372aa07662fb5779c8bf16d46fb58acb

  • SHA1

    5b5bce07b669039db3b8738538fad9cd898a9807

  • SHA256

    9a2a8d85677aba13c8b287580601052c9156f7d37a8e8b9d9ba4c6453f048537

  • SHA512

    f958ce972fdaaa26da8ca810813146157ac8c4550fef2a79dfd4c2ae7a527108bb6bf5660bc3528bc6db53d6086d59dc87c542527288674faedbed6980a9dca8

Malware Config

Targets

    • Target

      9a2a8d85677aba13c8b287580601052c9156f7d37a8e8b9d9ba4c6453f048537

    • Size

      320KB

    • MD5

      372aa07662fb5779c8bf16d46fb58acb

    • SHA1

      5b5bce07b669039db3b8738538fad9cd898a9807

    • SHA256

      9a2a8d85677aba13c8b287580601052c9156f7d37a8e8b9d9ba4c6453f048537

    • SHA512

      f958ce972fdaaa26da8ca810813146157ac8c4550fef2a79dfd4c2ae7a527108bb6bf5660bc3528bc6db53d6086d59dc87c542527288674faedbed6980a9dca8

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks