General

  • Target

    c46b445127238a99dada8eb19c9e716cc3e3b91ddec0e4aedf0ea00434292fc8

  • Size

    229KB

  • Sample

    240412-bqz2baec7x

  • MD5

    d9eaa1a42f5cf5c211531956da036b97

  • SHA1

    63d528fae22537f0238820f4d06b31746db32d61

  • SHA256

    c46b445127238a99dada8eb19c9e716cc3e3b91ddec0e4aedf0ea00434292fc8

  • SHA512

    8f37afa92d939921d444b47e8b655b5c780d19904660ce8a10da627b622d6beb0c5175f138201edebd5b65f12bc5734b04606f448fc2d49b0b9ee92bc040a3e7

  • SSDEEP

    3072:l29DkEGRQixVSjLwes5G30Bv7uZwOuz/xS3iGpZMhDEXzkOSUUKeF8a7K:l29qRfVSndj30B6wBxE1+ij5

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      c46b445127238a99dada8eb19c9e716cc3e3b91ddec0e4aedf0ea00434292fc8

    • Size

      229KB

    • MD5

      d9eaa1a42f5cf5c211531956da036b97

    • SHA1

      63d528fae22537f0238820f4d06b31746db32d61

    • SHA256

      c46b445127238a99dada8eb19c9e716cc3e3b91ddec0e4aedf0ea00434292fc8

    • SHA512

      8f37afa92d939921d444b47e8b655b5c780d19904660ce8a10da627b622d6beb0c5175f138201edebd5b65f12bc5734b04606f448fc2d49b0b9ee92bc040a3e7

    • SSDEEP

      3072:l29DkEGRQixVSjLwes5G30Bv7uZwOuz/xS3iGpZMhDEXzkOSUUKeF8a7K:l29qRfVSndj30B6wBxE1+ij5

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks