General

  • Target

    e6a9c9c5d3786c4fea54121ee5b6bd5fe0da555e8aaaf7f327870fbd7279c742

  • Size

    92KB

  • Sample

    220131-a1chbscgdk

  • MD5

    1077a39788e88dbf07c0b6ef3f143fd4

  • SHA1

    3c334b391a955e6c59c66a991475c96807233b9c

  • SHA256

    e6a9c9c5d3786c4fea54121ee5b6bd5fe0da555e8aaaf7f327870fbd7279c742

  • SHA512

    c5a57b3fb5461659f4fe078512681e445a45869d13b9a472f0dd6118e7fa893824c56af6790535eb1828a29be8b6042ac99ca3c19306ace295351b2fc9b7df1a

Malware Config

Targets

    • Target

      e6a9c9c5d3786c4fea54121ee5b6bd5fe0da555e8aaaf7f327870fbd7279c742

    • Size

      92KB

    • MD5

      1077a39788e88dbf07c0b6ef3f143fd4

    • SHA1

      3c334b391a955e6c59c66a991475c96807233b9c

    • SHA256

      e6a9c9c5d3786c4fea54121ee5b6bd5fe0da555e8aaaf7f327870fbd7279c742

    • SHA512

      c5a57b3fb5461659f4fe078512681e445a45869d13b9a472f0dd6118e7fa893824c56af6790535eb1828a29be8b6042ac99ca3c19306ace295351b2fc9b7df1a

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks