General

  • Target

    cf6c25fac3c90da84500f7d672686b13a0af90322ef7e7d6a3565d782a22596c

  • Size

    411KB

  • Sample

    231114-xwy7vseg78

  • MD5

    855771f2064ccb4d77b0fcf993080fb4

  • SHA1

    fd2bebced8a5157dcae9598c59317d6ea72fcb45

  • SHA256

    cf6c25fac3c90da84500f7d672686b13a0af90322ef7e7d6a3565d782a22596c

  • SHA512

    c6ea7cd01ca22fc64d3d68ada04d449df474ac21bcb9164f04aaeadb0559398b17e9555174129f894f40b06f6e0d9af72aac524c5a1316fa6d69f902ec2faf26

  • SSDEEP

    6144:LHkZeUwBxE1+ijiBKk3etdgI2MyzNORQtOfl1qNVo7R+S+N/TU7kn5119J3rR05d:zkZbw8EYiBlMkn5f9J105ko8W

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      cf6c25fac3c90da84500f7d672686b13a0af90322ef7e7d6a3565d782a22596c

    • Size

      411KB

    • MD5

      855771f2064ccb4d77b0fcf993080fb4

    • SHA1

      fd2bebced8a5157dcae9598c59317d6ea72fcb45

    • SHA256

      cf6c25fac3c90da84500f7d672686b13a0af90322ef7e7d6a3565d782a22596c

    • SHA512

      c6ea7cd01ca22fc64d3d68ada04d449df474ac21bcb9164f04aaeadb0559398b17e9555174129f894f40b06f6e0d9af72aac524c5a1316fa6d69f902ec2faf26

    • SSDEEP

      6144:LHkZeUwBxE1+ijiBKk3etdgI2MyzNORQtOfl1qNVo7R+S+N/TU7kn5119J3rR05d:zkZbw8EYiBlMkn5f9J105ko8W

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks