General
-
Target
6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231
-
Size
64KB
-
Sample
240411-18d91aab81
-
MD5
1119a0e6971e5c0773c780ed380c9ae5
-
SHA1
7b2ea5a52d4875caf342877befa5c1ea62e6db5d
-
SHA256
6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231
-
SHA512
4154d97e6973b7c6b037dd274dee90f361a7dd4378de4c26454499df24513c6aaddf9a404346360b2c566ac4e5a502c4e54e1ed47456e6d3c9d382f4af3f4b5e
-
SSDEEP
768:Y0gD04rmpLAuJGlfAHI9lqnP8q0gXg0uvsVWZz/L4i/ym23ysRaKFt9kS3DCkeI9:YNpmpkzAHkq0gXgffZgiKKsDNDCkruk
Static task
static1
Behavioral task
behavioral1
Sample
6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
sakula
www.polarroute.com
Targets
-
-
Target
6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231
-
Size
64KB
-
MD5
1119a0e6971e5c0773c780ed380c9ae5
-
SHA1
7b2ea5a52d4875caf342877befa5c1ea62e6db5d
-
SHA256
6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231
-
SHA512
4154d97e6973b7c6b037dd274dee90f361a7dd4378de4c26454499df24513c6aaddf9a404346360b2c566ac4e5a502c4e54e1ed47456e6d3c9d382f4af3f4b5e
-
SSDEEP
768:Y0gD04rmpLAuJGlfAHI9lqnP8q0gXg0uvsVWZz/L4i/ym23ysRaKFt9kS3DCkeI9:YNpmpkzAHkq0gXgffZgiKKsDNDCkruk
Score10/10-
Sakula payload
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-