General

  • Target

    NEAS.0463ea6eb50aaba5d70ea2fe1e739ec0.exe

  • Size

    190KB

  • Sample

    231102-kqb4xshg5v

  • MD5

    0463ea6eb50aaba5d70ea2fe1e739ec0

  • SHA1

    0fbc61b18b5a6aa3cdbb1fdee8fe0dd0fc899673

  • SHA256

    dc1f2c6070b94cb1b080e39a17e17d59a55a53c04eb01cc3c271ae8f14ecefc3

  • SHA512

    008035b909528f108b5865a5c25b3a2a7b6197225dd3defe79fcbd22f58e974ca6ef9e4989aae4259b10995087f55a679c0dcc1ad7dd1592abd785d6683dd4f6

  • SSDEEP

    3072:929DkEGRQixVSjLa130BYgjXjp+y9T7uZwOuz/xS4:929qRfVSnA30B7XjUbwBx9

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      NEAS.0463ea6eb50aaba5d70ea2fe1e739ec0.exe

    • Size

      190KB

    • MD5

      0463ea6eb50aaba5d70ea2fe1e739ec0

    • SHA1

      0fbc61b18b5a6aa3cdbb1fdee8fe0dd0fc899673

    • SHA256

      dc1f2c6070b94cb1b080e39a17e17d59a55a53c04eb01cc3c271ae8f14ecefc3

    • SHA512

      008035b909528f108b5865a5c25b3a2a7b6197225dd3defe79fcbd22f58e974ca6ef9e4989aae4259b10995087f55a679c0dcc1ad7dd1592abd785d6683dd4f6

    • SSDEEP

      3072:929DkEGRQixVSjLa130BYgjXjp+y9T7uZwOuz/xS4:929qRfVSnA30B7XjUbwBx9

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks