General

  • Target

    NEAS.bb43ccaa3a25195f51c570176738c740_JC.exe

  • Size

    96KB

  • Sample

    231031-16wq9sef4t

  • MD5

    bb43ccaa3a25195f51c570176738c740

  • SHA1

    b4ed2497b0ac0e595014569b68ee90730f17a1fb

  • SHA256

    c1e51a3a7546cf353bd4b8fcc0e42f1187f7a262e42b6bb752353bc35dc55582

  • SHA512

    c874fc2393477399382824ca73695cb144878e9b8763d01fc84536faff795c6bb4672c99c121ad0558c5723e9b087f72d0d9976b2a3943538afcf84b1795277f

  • SSDEEP

    1536:rODhc+yBJW0WTU5XM1nJqjp0DNDCkruZqcuOuz/xSo:ku+kJHB8FJqjpq7uZwOuz/xSo

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      NEAS.bb43ccaa3a25195f51c570176738c740_JC.exe

    • Size

      96KB

    • MD5

      bb43ccaa3a25195f51c570176738c740

    • SHA1

      b4ed2497b0ac0e595014569b68ee90730f17a1fb

    • SHA256

      c1e51a3a7546cf353bd4b8fcc0e42f1187f7a262e42b6bb752353bc35dc55582

    • SHA512

      c874fc2393477399382824ca73695cb144878e9b8763d01fc84536faff795c6bb4672c99c121ad0558c5723e9b087f72d0d9976b2a3943538afcf84b1795277f

    • SSDEEP

      1536:rODhc+yBJW0WTU5XM1nJqjp0DNDCkruZqcuOuz/xSo:ku+kJHB8FJqjpq7uZwOuz/xSo

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks