General

  • Target

    47d544b11616e95f281b09cbb2df92b1baac7a1400b5c50505763ffe62dd7efb

  • Size

    79KB

  • Sample

    220131-bgrctadfh3

  • MD5

    06ec79f67ad8ede9a3bd0810d88e3539

  • SHA1

    6b93386ba19c23fc031308da9c245e4e745bbb3e

  • SHA256

    47d544b11616e95f281b09cbb2df92b1baac7a1400b5c50505763ffe62dd7efb

  • SHA512

    33ee39b830f1964c5f45fc9aff6d96f954ef06263ba4c58a6a19fdd0de1afea8aceac5b232ec1861349b3e899ab825617db3d38a10fd1558f59344c49e6b5650

Malware Config

Targets

    • Target

      47d544b11616e95f281b09cbb2df92b1baac7a1400b5c50505763ffe62dd7efb

    • Size

      79KB

    • MD5

      06ec79f67ad8ede9a3bd0810d88e3539

    • SHA1

      6b93386ba19c23fc031308da9c245e4e745bbb3e

    • SHA256

      47d544b11616e95f281b09cbb2df92b1baac7a1400b5c50505763ffe62dd7efb

    • SHA512

      33ee39b830f1964c5f45fc9aff6d96f954ef06263ba4c58a6a19fdd0de1afea8aceac5b232ec1861349b3e899ab825617db3d38a10fd1558f59344c49e6b5650

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks