General

  • Target

    82fee0c6b3b147b3127d5395013fa78f1563cf7afadedd762631720c095e912c

  • Size

    44KB

  • Sample

    220323-lkdw1abge7

  • MD5

    c37ff8b3db540a36ae8cdaf672330283

  • SHA1

    0be70fcd35c3561d178b35606232046d2b9c656e

  • SHA256

    82fee0c6b3b147b3127d5395013fa78f1563cf7afadedd762631720c095e912c

  • SHA512

    2e1710f178487f560cf744ffa8488fde1dab7a8f685c63e77e05f1fe8034f2fbf2bed64daf4859cc57ba1c58ab25ebe191bd96db7ccd9abd58c1e65d8ebbf4be

Malware Config

Targets

    • Target

      82fee0c6b3b147b3127d5395013fa78f1563cf7afadedd762631720c095e912c

    • Size

      44KB

    • MD5

      c37ff8b3db540a36ae8cdaf672330283

    • SHA1

      0be70fcd35c3561d178b35606232046d2b9c656e

    • SHA256

      82fee0c6b3b147b3127d5395013fa78f1563cf7afadedd762631720c095e912c

    • SHA512

      2e1710f178487f560cf744ffa8488fde1dab7a8f685c63e77e05f1fe8034f2fbf2bed64daf4859cc57ba1c58ab25ebe191bd96db7ccd9abd58c1e65d8ebbf4be

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Remote System Discovery

1
T1018

Tasks