General
-
Target
35306d32cf510c233ddbd3ffd6b0613b4d3d47cadf7e17c948038e6d7f041243
-
Size
41KB
-
Sample
241009-ysb4lasgkr
-
MD5
f2efcb0022bfaf9c509bc6160f08bb63
-
SHA1
75c016abb78026bd3841d2f5e71da5a879665b4e
-
SHA256
35306d32cf510c233ddbd3ffd6b0613b4d3d47cadf7e17c948038e6d7f041243
-
SHA512
8ccd327bd0403ff175fa1cc82c21cbc1522ff383400d34c20c804319f9fb2e06ef05ecad54d3a7381a07791036af1e5b3609503c014d2dedfebf320c14900a7a
-
SSDEEP
768:9zpVJi5kPTIukEYpcHOZ6rFSBZxkXNVkSXtfgn3JkcBwQoabJF7nbcuyD7UX:N/JKiMLE9bOq5fgn6Ozoaz7nouy8X
Behavioral task
behavioral1
Sample
35306d32cf510c233ddbd3ffd6b0613b4d3d47cadf7e17c948038e6d7f041243.exe
Resource
win7-20240903-en
Malware Config
Extracted
sakula
www.polarroute.com
Targets
-
-
Target
35306d32cf510c233ddbd3ffd6b0613b4d3d47cadf7e17c948038e6d7f041243
-
Size
41KB
-
MD5
f2efcb0022bfaf9c509bc6160f08bb63
-
SHA1
75c016abb78026bd3841d2f5e71da5a879665b4e
-
SHA256
35306d32cf510c233ddbd3ffd6b0613b4d3d47cadf7e17c948038e6d7f041243
-
SHA512
8ccd327bd0403ff175fa1cc82c21cbc1522ff383400d34c20c804319f9fb2e06ef05ecad54d3a7381a07791036af1e5b3609503c014d2dedfebf320c14900a7a
-
SSDEEP
768:9zpVJi5kPTIukEYpcHOZ6rFSBZxkXNVkSXtfgn3JkcBwQoabJF7nbcuyD7UX:N/JKiMLE9bOq5fgn6Ozoaz7nouy8X
-
Sakula payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1