General

  • Target

    NEAS.86f540cb1a64b17ab32196c9382f1470.exe

  • Size

    190KB

  • Sample

    231021-z9mr4aeh8v

  • MD5

    86f540cb1a64b17ab32196c9382f1470

  • SHA1

    19a1ad0cf4ee5947c82bb81cf6b1bf4b1035bb15

  • SHA256

    131c45691ffed3a1896f9f412a4b50298f1778068bafae96cdd90ceb04dc22d6

  • SHA512

    6527729b443e693aa1168d6bc9e715e5cefad06953cbc6e599adb3aff0f66667916bfcd7b1334626553d0cef079d6d6f026f526afafb0cca0daa6a8ed2d43aa8

  • SSDEEP

    3072:929DkEGRQixVSjLa130BYgjXjp+y9T7uZwOuz/xS0:929qRfVSnA30B7XjUbwBxF

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      NEAS.86f540cb1a64b17ab32196c9382f1470.exe

    • Size

      190KB

    • MD5

      86f540cb1a64b17ab32196c9382f1470

    • SHA1

      19a1ad0cf4ee5947c82bb81cf6b1bf4b1035bb15

    • SHA256

      131c45691ffed3a1896f9f412a4b50298f1778068bafae96cdd90ceb04dc22d6

    • SHA512

      6527729b443e693aa1168d6bc9e715e5cefad06953cbc6e599adb3aff0f66667916bfcd7b1334626553d0cef079d6d6f026f526afafb0cca0daa6a8ed2d43aa8

    • SSDEEP

      3072:929DkEGRQixVSjLa130BYgjXjp+y9T7uZwOuz/xS0:929qRfVSnA30B7XjUbwBxF

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks