General

  • Target

    NEAS.0e09b575fe45c8c91f65cd0625a67fd0_JC.exe

  • Size

    98KB

  • Sample

    231024-ap8fmahd2t

  • MD5

    0e09b575fe45c8c91f65cd0625a67fd0

  • SHA1

    986bfd4b4f33f96ddddab052a29c14ab39b8dbdb

  • SHA256

    d9dbad10c866c206300b33084964c83ad8be741150f826903e16258f030d457e

  • SHA512

    02bca2042127a38ab8569f0f88645877a39f56a9771452712803c28400ccd2b3a179421735648407b38cf7ebc4ef5fe36d41ac4e414b56bbe70cde8133263631

  • SSDEEP

    1536:XQFl29mEkE0L1rDEKrxZKF2zf9g2Pl7W/MwbxMX+ees52z30rtrBuxzuO:429DkEGRQixVSjLaes5G30B6l

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      NEAS.0e09b575fe45c8c91f65cd0625a67fd0_JC.exe

    • Size

      98KB

    • MD5

      0e09b575fe45c8c91f65cd0625a67fd0

    • SHA1

      986bfd4b4f33f96ddddab052a29c14ab39b8dbdb

    • SHA256

      d9dbad10c866c206300b33084964c83ad8be741150f826903e16258f030d457e

    • SHA512

      02bca2042127a38ab8569f0f88645877a39f56a9771452712803c28400ccd2b3a179421735648407b38cf7ebc4ef5fe36d41ac4e414b56bbe70cde8133263631

    • SSDEEP

      1536:XQFl29mEkE0L1rDEKrxZKF2zf9g2Pl7W/MwbxMX+ees52z30rtrBuxzuO:429DkEGRQixVSjLaes5G30B6l

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks