General

  • Target

    NEAS.8c83a64bf38320f5036654e658af4510_JC.exe

  • Size

    212KB

  • Sample

    231020-hmmp5see9t

  • MD5

    8c83a64bf38320f5036654e658af4510

  • SHA1

    c3afff81dfb27ee9a3c9f74580be374a9a848143

  • SHA256

    f808b07da8be3d310dd032176fa043055a26395e2f5b79587dbdbece53ff0dee

  • SHA512

    3d729daf1669a87d4a9207ab3a6a733166cdb0f95e4acbb22ac1c37bb163b00f90d4f58dc9d93105535b1a4ad196d2fc0e05b376d9e0aef409606ee29dc91456

  • SSDEEP

    1536:TtQFl29mEkE0L1rDEKrxZKF2zf9g2Pl7W/MwbxMX++pdz30rtr8gjXjp0lanB:y29DkEGRQixVSjLc130BYgjXjpLnB

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      NEAS.8c83a64bf38320f5036654e658af4510_JC.exe

    • Size

      212KB

    • MD5

      8c83a64bf38320f5036654e658af4510

    • SHA1

      c3afff81dfb27ee9a3c9f74580be374a9a848143

    • SHA256

      f808b07da8be3d310dd032176fa043055a26395e2f5b79587dbdbece53ff0dee

    • SHA512

      3d729daf1669a87d4a9207ab3a6a733166cdb0f95e4acbb22ac1c37bb163b00f90d4f58dc9d93105535b1a4ad196d2fc0e05b376d9e0aef409606ee29dc91456

    • SSDEEP

      1536:TtQFl29mEkE0L1rDEKrxZKF2zf9g2Pl7W/MwbxMX++pdz30rtr8gjXjp0lanB:y29DkEGRQixVSjLc130BYgjXjpLnB

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks