General

  • Target

    06979704d1ca036bdb046588c88809bb26760745ac85f9104293800f419945c4

  • Size

    320KB

  • Sample

    220131-ar85yacfcp

  • MD5

    1d016bb286980fd356cab21cdfcb49f4

  • SHA1

    71731027ce38f6840c592b83cc20eb9071eccaa9

  • SHA256

    06979704d1ca036bdb046588c88809bb26760745ac85f9104293800f419945c4

  • SHA512

    d4c0ff5077e77f84aae8482ca195bf0515488f18977a368f81cfc19cb2a2816e25a4d5f40caf1f2b3789619fc31511db3c9fede1121935a240345195093a0b82

Malware Config

Targets

    • Target

      06979704d1ca036bdb046588c88809bb26760745ac85f9104293800f419945c4

    • Size

      320KB

    • MD5

      1d016bb286980fd356cab21cdfcb49f4

    • SHA1

      71731027ce38f6840c592b83cc20eb9071eccaa9

    • SHA256

      06979704d1ca036bdb046588c88809bb26760745ac85f9104293800f419945c4

    • SHA512

      d4c0ff5077e77f84aae8482ca195bf0515488f18977a368f81cfc19cb2a2816e25a4d5f40caf1f2b3789619fc31511db3c9fede1121935a240345195093a0b82

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks