General

  • Target

    6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231

  • Size

    64KB

  • Sample

    240411-18d91aab81

  • MD5

    1119a0e6971e5c0773c780ed380c9ae5

  • SHA1

    7b2ea5a52d4875caf342877befa5c1ea62e6db5d

  • SHA256

    6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231

  • SHA512

    4154d97e6973b7c6b037dd274dee90f361a7dd4378de4c26454499df24513c6aaddf9a404346360b2c566ac4e5a502c4e54e1ed47456e6d3c9d382f4af3f4b5e

  • SSDEEP

    768:Y0gD04rmpLAuJGlfAHI9lqnP8q0gXg0uvsVWZz/L4i/ym23ysRaKFt9kS3DCkeI9:YNpmpkzAHkq0gXgffZgiKKsDNDCkruk

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231

    • Size

      64KB

    • MD5

      1119a0e6971e5c0773c780ed380c9ae5

    • SHA1

      7b2ea5a52d4875caf342877befa5c1ea62e6db5d

    • SHA256

      6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231

    • SHA512

      4154d97e6973b7c6b037dd274dee90f361a7dd4378de4c26454499df24513c6aaddf9a404346360b2c566ac4e5a502c4e54e1ed47456e6d3c9d382f4af3f4b5e

    • SSDEEP

      768:Y0gD04rmpLAuJGlfAHI9lqnP8q0gXg0uvsVWZz/L4i/ym23ysRaKFt9kS3DCkeI9:YNpmpkzAHkq0gXgffZgiKKsDNDCkruk

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula payload

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks