General

  • Target

    3d3cdf96a12285e82cb76c8f2a9b8bb728d4a7ee28926ceea8f9c48076e14675

  • Size

    89KB

  • Sample

    220131-a442radec4

  • MD5

    0e5d1b941dcb597eb9b7dc1f0694c65f

  • SHA1

    af6b54fa78118310d028dac1874f190080d178da

  • SHA256

    3d3cdf96a12285e82cb76c8f2a9b8bb728d4a7ee28926ceea8f9c48076e14675

  • SHA512

    425f236160dae675430710dcbef5e7d70208c139d5a268d2345de3d5d4ec0be9c1e4deb3832fd84ad7e29da24a389b92bb85549306382b85a1afa37719419907

Malware Config

Targets

    • Target

      3d3cdf96a12285e82cb76c8f2a9b8bb728d4a7ee28926ceea8f9c48076e14675

    • Size

      89KB

    • MD5

      0e5d1b941dcb597eb9b7dc1f0694c65f

    • SHA1

      af6b54fa78118310d028dac1874f190080d178da

    • SHA256

      3d3cdf96a12285e82cb76c8f2a9b8bb728d4a7ee28926ceea8f9c48076e14675

    • SHA512

      425f236160dae675430710dcbef5e7d70208c139d5a268d2345de3d5d4ec0be9c1e4deb3832fd84ad7e29da24a389b92bb85549306382b85a1afa37719419907

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks