General

  • Target

    02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7

  • Size

    5.2MB

  • Sample

    230807-qmnlfagg3w

  • MD5

    82a801529478f463148878aecba8f75b

  • SHA1

    dc31ca34d15ecf84a1d3d16560089d382237cfbe

  • SHA256

    02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7

  • SHA512

    e3bfcaa4f51704999e8bdad911babbff141f89f1ab15abb0ae6d06612527df630c821d68e87c652db76d6b62d365edda61d3f1a9ef7589905013d8b877a7e3c1

  • SSDEEP

    6144:H29qRfVSnt30Bbt+IhDFAT/HAkJtkJxkJ5kJekJXkJuJ6kJuJZkJuJvkJuJmkJuG:TRfQnA+2m18i

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7

    • Size

      5.2MB

    • MD5

      82a801529478f463148878aecba8f75b

    • SHA1

      dc31ca34d15ecf84a1d3d16560089d382237cfbe

    • SHA256

      02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7

    • SHA512

      e3bfcaa4f51704999e8bdad911babbff141f89f1ab15abb0ae6d06612527df630c821d68e87c652db76d6b62d365edda61d3f1a9ef7589905013d8b877a7e3c1

    • SSDEEP

      6144:H29qRfVSnt30Bbt+IhDFAT/HAkJtkJxkJ5kJekJXkJuJ6kJuJZkJuJvkJuJmkJuG:TRfQnA+2m18i

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula payload

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Tasks