General

  • Target

    e0b1c8f113d5c4c5359a81dd7e7555b5a30aef21cf655c7cd8309668ab438115

  • Size

    89KB

  • Sample

    220131-a7gqmadef2

  • MD5

    0d0f5c0416247bb1dd6e0e2be1114b67

  • SHA1

    8f0aec8daa26f40af01f22375e6245a06791c02d

  • SHA256

    e0b1c8f113d5c4c5359a81dd7e7555b5a30aef21cf655c7cd8309668ab438115

  • SHA512

    0b6c86ae960d21a737db12668e2d6c75f8c5fc1ede078d02faae41ef764353e6d5c2acdf134818c2326c535d8f2caecdf908c4d178eafe4a64bbf826f7b6b6b5

Malware Config

Targets

    • Target

      e0b1c8f113d5c4c5359a81dd7e7555b5a30aef21cf655c7cd8309668ab438115

    • Size

      89KB

    • MD5

      0d0f5c0416247bb1dd6e0e2be1114b67

    • SHA1

      8f0aec8daa26f40af01f22375e6245a06791c02d

    • SHA256

      e0b1c8f113d5c4c5359a81dd7e7555b5a30aef21cf655c7cd8309668ab438115

    • SHA512

      0b6c86ae960d21a737db12668e2d6c75f8c5fc1ede078d02faae41ef764353e6d5c2acdf134818c2326c535d8f2caecdf908c4d178eafe4a64bbf826f7b6b6b5

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks