Resubmissions

22-02-2022 13:18

220222-qj1ftshcc3 10

06-07-2020 07:26

200706-y19694vzp2 1

General

  • Target

    6feeea94219e2b7ffd3837d784201bf28ffd7bc83706401bf656550485d899cc

  • Size

    77KB

  • Sample

    220222-qj1ftshcc3

  • MD5

    a9fa03b0ee47e03796efe60d4186c484

  • SHA1

    52e788cac7568f07868f2a63e856baa19b5671c0

  • SHA256

    6feeea94219e2b7ffd3837d784201bf28ffd7bc83706401bf656550485d899cc

  • SHA512

    8e149c5568a22a2e18b37d7895465430bdf0af532fdba80a704c0f8eb52645162d880bf9322e8af0c9002e892f3b93e96c0ef103ce5044c449756c5d4834064d

Malware Config

Targets

    • Target

      6feeea94219e2b7ffd3837d784201bf28ffd7bc83706401bf656550485d899cc

    • Size

      77KB

    • MD5

      a9fa03b0ee47e03796efe60d4186c484

    • SHA1

      52e788cac7568f07868f2a63e856baa19b5671c0

    • SHA256

      6feeea94219e2b7ffd3837d784201bf28ffd7bc83706401bf656550485d899cc

    • SHA512

      8e149c5568a22a2e18b37d7895465430bdf0af532fdba80a704c0f8eb52645162d880bf9322e8af0c9002e892f3b93e96c0ef103ce5044c449756c5d4834064d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Remote System Discovery

1
T1018

Tasks