General

  • Target

    280622602950739b9b13be1aa783a895f674e85d0dccf78d6350bcaa214361a7

  • Size

    72KB

  • Sample

    220320-gnyclahgf3

  • MD5

    007a14d72f82e5718e99f23cefbad5c3

  • SHA1

    01bb44f4fb23529ee35a21b0aeb9dd397d72ad90

  • SHA256

    280622602950739b9b13be1aa783a895f674e85d0dccf78d6350bcaa214361a7

  • SHA512

    dac91685a48c284cd02b877df5262883925b955473b7f19e18c6ba68e71ed95ad6e66d49be3ef846b284ce8577508cdd68151eb744add2937f1a2666d76ebfd9

Malware Config

Targets

    • Target

      280622602950739b9b13be1aa783a895f674e85d0dccf78d6350bcaa214361a7

    • Size

      72KB

    • MD5

      007a14d72f82e5718e99f23cefbad5c3

    • SHA1

      01bb44f4fb23529ee35a21b0aeb9dd397d72ad90

    • SHA256

      280622602950739b9b13be1aa783a895f674e85d0dccf78d6350bcaa214361a7

    • SHA512

      dac91685a48c284cd02b877df5262883925b955473b7f19e18c6ba68e71ed95ad6e66d49be3ef846b284ce8577508cdd68151eb744add2937f1a2666d76ebfd9

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Remote System Discovery

1
T1018

Tasks