General

  • Target

    NEAS.0bd2e1549e25dcfa59256530861c72d0_JC.exe

  • Size

    190KB

  • Sample

    231016-q1yzbsfh5w

  • MD5

    0bd2e1549e25dcfa59256530861c72d0

  • SHA1

    41f863e5eb612adc9dbc29a09dbdf8223e896d4c

  • SHA256

    35e9ff5c915b6af524e014c453b8ce7820a0c0f9c54ff41ee3c0b68edbcc4bef

  • SHA512

    6fab1267c020e6b44e6cab4bbd05c902c8514bf4dad80f76ace5a09eafbbc1c69e03455cc81a3594fa9c34fcd948894d69195c96a7d55422f4af850a7fa9ed7d

  • SSDEEP

    3072:929DkEGRQixVSjLa130BYgjXjp+y9T7uZwOuz/xSs:929qRfVSnA30B7XjUbwBx1

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      NEAS.0bd2e1549e25dcfa59256530861c72d0_JC.exe

    • Size

      190KB

    • MD5

      0bd2e1549e25dcfa59256530861c72d0

    • SHA1

      41f863e5eb612adc9dbc29a09dbdf8223e896d4c

    • SHA256

      35e9ff5c915b6af524e014c453b8ce7820a0c0f9c54ff41ee3c0b68edbcc4bef

    • SHA512

      6fab1267c020e6b44e6cab4bbd05c902c8514bf4dad80f76ace5a09eafbbc1c69e03455cc81a3594fa9c34fcd948894d69195c96a7d55422f4af850a7fa9ed7d

    • SSDEEP

      3072:929DkEGRQixVSjLa130BYgjXjp+y9T7uZwOuz/xSs:929qRfVSnA30B7XjUbwBx1

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks