General

  • Target

    c282d35f4f5b6476fa15a710062b76ac2f74c73c4228fc5448e52618a8cb18a2

  • Size

    44KB

  • Sample

    220323-lkdw1abge9

  • MD5

    2e8a0f866db9089197a7ce653a31d8a4

  • SHA1

    a3d5131211641e9b5571e84a30f0315600714520

  • SHA256

    c282d35f4f5b6476fa15a710062b76ac2f74c73c4228fc5448e52618a8cb18a2

  • SHA512

    b1cb633c21a98d545252beb848370145b028dc8e7c7096c93c7cbb64a2087e7d29daba180b0b2386b884b914884c54b811052668d1d7e5b86e8c9eec830574ed

Malware Config

Targets

    • Target

      c282d35f4f5b6476fa15a710062b76ac2f74c73c4228fc5448e52618a8cb18a2

    • Size

      44KB

    • MD5

      2e8a0f866db9089197a7ce653a31d8a4

    • SHA1

      a3d5131211641e9b5571e84a30f0315600714520

    • SHA256

      c282d35f4f5b6476fa15a710062b76ac2f74c73c4228fc5448e52618a8cb18a2

    • SHA512

      b1cb633c21a98d545252beb848370145b028dc8e7c7096c93c7cbb64a2087e7d29daba180b0b2386b884b914884c54b811052668d1d7e5b86e8c9eec830574ed

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Remote System Discovery

1
T1018

Tasks