General

  • Target

    9650dc9d47757e58d86b82da745f70f1b3cf47d71ef903f8229608128e665aab

  • Size

    89KB

  • Sample

    220131-bbmgnsdfb8

  • MD5

    0a8a4cfa745b6350bea1b47f5754595e

  • SHA1

    2356f82fcc1b7fd0505711b0a320c57b14f2cc0d

  • SHA256

    9650dc9d47757e58d86b82da745f70f1b3cf47d71ef903f8229608128e665aab

  • SHA512

    8e775e53d5676bf56de95742880fe4816b1f091a00a920a949b8d6176a90095e9b3e80fa22623a663da9c1802305830943671147037c5a0be1e7cff450ea58fe

Malware Config

Targets

    • Target

      9650dc9d47757e58d86b82da745f70f1b3cf47d71ef903f8229608128e665aab

    • Size

      89KB

    • MD5

      0a8a4cfa745b6350bea1b47f5754595e

    • SHA1

      2356f82fcc1b7fd0505711b0a320c57b14f2cc0d

    • SHA256

      9650dc9d47757e58d86b82da745f70f1b3cf47d71ef903f8229608128e665aab

    • SHA512

      8e775e53d5676bf56de95742880fe4816b1f091a00a920a949b8d6176a90095e9b3e80fa22623a663da9c1802305830943671147037c5a0be1e7cff450ea58fe

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks