General

  • Target

    51fe6e36cc11720e5d5d2b11993175fd7b95de6a28ecb58deb783e1a4ef0f758

  • Size

    79KB

  • Sample

    220131-aya7gscgal

  • MD5

    116dbfd8f5b6c5a5522d3b83a3821268

  • SHA1

    a87e52e413a3407dc5284e090a636680979592cc

  • SHA256

    51fe6e36cc11720e5d5d2b11993175fd7b95de6a28ecb58deb783e1a4ef0f758

  • SHA512

    471bad05c24db39ffa336f2c8f32c255af07ec754020eb7759df3660bd85b855cc75db18b7053a2e9ae9cb6c59bfa889ba97956d62a50a81287ae35e846a7f58

Malware Config

Targets

    • Target

      51fe6e36cc11720e5d5d2b11993175fd7b95de6a28ecb58deb783e1a4ef0f758

    • Size

      79KB

    • MD5

      116dbfd8f5b6c5a5522d3b83a3821268

    • SHA1

      a87e52e413a3407dc5284e090a636680979592cc

    • SHA256

      51fe6e36cc11720e5d5d2b11993175fd7b95de6a28ecb58deb783e1a4ef0f758

    • SHA512

      471bad05c24db39ffa336f2c8f32c255af07ec754020eb7759df3660bd85b855cc75db18b7053a2e9ae9cb6c59bfa889ba97956d62a50a81287ae35e846a7f58

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks