General
-
Target
9e36689e3014cd8b1955ea5f3e4d6820N.exe
-
Size
63KB
-
Sample
240821-y6w1xsyejc
-
MD5
9e36689e3014cd8b1955ea5f3e4d6820
-
SHA1
a9f139ebb83b35adb80af75361f42d732cf3c576
-
SHA256
f00f8092b71b35642289972a25fea1c95267d30ef97f68fec553bdf1d685c8c5
-
SHA512
225710da187a5959068a82a7eadcd39fab61238f4381fca42ce58d428c36453ba253d04f1df6358a8a31fdd60dcd7eacb48178afea145246a8fcd89d4cf38153
-
SSDEEP
1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrF:0PPUj3+5FMIn8To94wa7F
Behavioral task
behavioral1
Sample
9e36689e3014cd8b1955ea5f3e4d6820N.exe
Resource
win7-20240708-en
Malware Config
Extracted
sakula
www.polarroute.com
Targets
-
-
Target
9e36689e3014cd8b1955ea5f3e4d6820N.exe
-
Size
63KB
-
MD5
9e36689e3014cd8b1955ea5f3e4d6820
-
SHA1
a9f139ebb83b35adb80af75361f42d732cf3c576
-
SHA256
f00f8092b71b35642289972a25fea1c95267d30ef97f68fec553bdf1d685c8c5
-
SHA512
225710da187a5959068a82a7eadcd39fab61238f4381fca42ce58d428c36453ba253d04f1df6358a8a31fdd60dcd7eacb48178afea145246a8fcd89d4cf38153
-
SSDEEP
1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrF:0PPUj3+5FMIn8To94wa7F
-
Sakula payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1