General

  • Target

    NEAS.c49775978cfd25a9e5373afad7de51d0.exe

  • Size

    300KB

  • Sample

    231109-y69a9aeg45

  • MD5

    c49775978cfd25a9e5373afad7de51d0

  • SHA1

    635fc8df88d3a70a57e8ac3da0863651068cf7a1

  • SHA256

    1750a3d2a6a958392ab8013cf84048adf697d80c894e9abeee7c6316114daa4b

  • SHA512

    60dae27a448f15db0c96bc631d364755e330983c2b27dbd9a89b131177b28bb0e124832d2996efb17d3e8a4c41d7bbfd19327122f1405056f7797f512fb38832

  • SSDEEP

    6144:M29qRfVSndj30B3wBxE1+ijiBKk3etdgI2MyzNORQtOfl1qNVo7R+S+N/v:0RfQn+w8EYiBlr

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      NEAS.c49775978cfd25a9e5373afad7de51d0.exe

    • Size

      300KB

    • MD5

      c49775978cfd25a9e5373afad7de51d0

    • SHA1

      635fc8df88d3a70a57e8ac3da0863651068cf7a1

    • SHA256

      1750a3d2a6a958392ab8013cf84048adf697d80c894e9abeee7c6316114daa4b

    • SHA512

      60dae27a448f15db0c96bc631d364755e330983c2b27dbd9a89b131177b28bb0e124832d2996efb17d3e8a4c41d7bbfd19327122f1405056f7797f512fb38832

    • SSDEEP

      6144:M29qRfVSndj30B3wBxE1+ijiBKk3etdgI2MyzNORQtOfl1qNVo7R+S+N/v:0RfQn+w8EYiBlr

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks