General

  • Target

    NEAS.6193a74e62123c16686b6f2c919f4d60.exe

  • Size

    190KB

  • Sample

    231101-b45hysgg4v

  • MD5

    6193a74e62123c16686b6f2c919f4d60

  • SHA1

    6a6f8a28447d54439da55330fd6f295a8f169ec9

  • SHA256

    8eb494fe027890522becc1f9d15cbc34770b074aebb198c3731009e1f89d3279

  • SHA512

    2b03ea31bc076b270144d6e64965099e24686b351aa1701f4fc1155be26ce81894ead48fd0754310a5fc0ef35a52d504c298b2b00d6543d2d9a4c3578c5cbf01

  • SSDEEP

    3072:929DkEGRQixVSjLa130BYgjXjp+y9T7uZwOuz/xSm:929qRfVSnA30B7XjUbwBxr

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      NEAS.6193a74e62123c16686b6f2c919f4d60.exe

    • Size

      190KB

    • MD5

      6193a74e62123c16686b6f2c919f4d60

    • SHA1

      6a6f8a28447d54439da55330fd6f295a8f169ec9

    • SHA256

      8eb494fe027890522becc1f9d15cbc34770b074aebb198c3731009e1f89d3279

    • SHA512

      2b03ea31bc076b270144d6e64965099e24686b351aa1701f4fc1155be26ce81894ead48fd0754310a5fc0ef35a52d504c298b2b00d6543d2d9a4c3578c5cbf01

    • SSDEEP

      3072:929DkEGRQixVSjLa130BYgjXjp+y9T7uZwOuz/xSm:929qRfVSnA30B7XjUbwBxr

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks