General

  • Target

    415dc126af775a928a51c872a6513d6ac9f5dcd84e00734b409d58a5922de96e

  • Size

    79KB

  • Sample

    220131-a9qrbadeh5

  • MD5

    0b6a0ca44e47609910d978ffb1ee49c6

  • SHA1

    e0fee9ccd0368f6f3acf0e9f2885dccd8f8b5359

  • SHA256

    415dc126af775a928a51c872a6513d6ac9f5dcd84e00734b409d58a5922de96e

  • SHA512

    3fd47a464cb2110d3d4127a09fc85d60ded77c9e385e290253e92051910b555b6b649e9c91069b776b6403d310a19277da4ec6d344a9622954cf1ed534bf758a

Malware Config

Targets

    • Target

      415dc126af775a928a51c872a6513d6ac9f5dcd84e00734b409d58a5922de96e

    • Size

      79KB

    • MD5

      0b6a0ca44e47609910d978ffb1ee49c6

    • SHA1

      e0fee9ccd0368f6f3acf0e9f2885dccd8f8b5359

    • SHA256

      415dc126af775a928a51c872a6513d6ac9f5dcd84e00734b409d58a5922de96e

    • SHA512

      3fd47a464cb2110d3d4127a09fc85d60ded77c9e385e290253e92051910b555b6b649e9c91069b776b6403d310a19277da4ec6d344a9622954cf1ed534bf758a

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks