General

  • Target

    f51e2fc29948b0d9b8dea19834f817d0N.exe

  • Size

    63KB

  • Sample

    240907-kl1aysvern

  • MD5

    f51e2fc29948b0d9b8dea19834f817d0

  • SHA1

    7a3ed6da5841f309380e25fd190585a766c5f492

  • SHA256

    05e590c54a87adf25cfc93f5db22b06f4c6ba762d661852dac562299a214b716

  • SHA512

    c9ee9658c70ba2795294c4181a64cf8bf7a55db24d6abfe31277e514fb7c481ec70afd7f9241f569ff3e8c08ec1c0b85e3b086a4e4f8eb910ab64cba8322eebe

  • SSDEEP

    1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrf:0PPUj3+5FMIn8To94wa7f

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      f51e2fc29948b0d9b8dea19834f817d0N.exe

    • Size

      63KB

    • MD5

      f51e2fc29948b0d9b8dea19834f817d0

    • SHA1

      7a3ed6da5841f309380e25fd190585a766c5f492

    • SHA256

      05e590c54a87adf25cfc93f5db22b06f4c6ba762d661852dac562299a214b716

    • SHA512

      c9ee9658c70ba2795294c4181a64cf8bf7a55db24d6abfe31277e514fb7c481ec70afd7f9241f569ff3e8c08ec1c0b85e3b086a4e4f8eb910ab64cba8322eebe

    • SSDEEP

      1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrf:0PPUj3+5FMIn8To94wa7f

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks