General

  • Target

    8f19ce236f15963d887a51f714f495b3_JC.exe

  • Size

    212KB

  • Sample

    231003-wjgxdaee4s

  • MD5

    8f19ce236f15963d887a51f714f495b3

  • SHA1

    650c72dda8e1bfa135555dfac407d23be7c20791

  • SHA256

    2b0fe9ce990068e2cd5248f4039c05cbd3aec7dc6da23b1e6f0bf0035c961373

  • SHA512

    c2e7e6357077fb28fee6b4104197e21253f6ae4605d1216836260e3b41f1db055a00866672a77b037b0cace5bbc6d0a008cd444f76a7d28074b8c9b573bf89ef

  • SSDEEP

    1536:btQFl29mEkE0L1rDEKrxZKF2zf9g2Pl7W/MwbxMX++pdz30rtr8gjXjp0VanBn:K29DkEGRQixVSjLc130BYgjXjprnBn

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      8f19ce236f15963d887a51f714f495b3_JC.exe

    • Size

      212KB

    • MD5

      8f19ce236f15963d887a51f714f495b3

    • SHA1

      650c72dda8e1bfa135555dfac407d23be7c20791

    • SHA256

      2b0fe9ce990068e2cd5248f4039c05cbd3aec7dc6da23b1e6f0bf0035c961373

    • SHA512

      c2e7e6357077fb28fee6b4104197e21253f6ae4605d1216836260e3b41f1db055a00866672a77b037b0cace5bbc6d0a008cd444f76a7d28074b8c9b573bf89ef

    • SSDEEP

      1536:btQFl29mEkE0L1rDEKrxZKF2zf9g2Pl7W/MwbxMX++pdz30rtr8gjXjp0VanBn:K29DkEGRQixVSjLc130BYgjXjprnBn

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks