General

  • Target

    ec4cdcf3df5952af29885abefd917f5a3b259cb396b4d0647cbeaf3f6ece0e79N

  • Size

    63KB

  • Sample

    241022-vghv8axdqk

  • MD5

    79db8ef7c4252a7d381a065567f01df0

  • SHA1

    00ebab132db45027398b329c33f0cbd7c4b71fdc

  • SHA256

    ec4cdcf3df5952af29885abefd917f5a3b259cb396b4d0647cbeaf3f6ece0e79

  • SHA512

    f888aac835bf0b8014dbe5552058be94e8001c7dce0ed33df8acf71d9cc14b03db6ec7e43e918b73216b8fc23c94fe716ffa8b1138faba05447ca87d069e5814

  • SSDEEP

    1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrg:0PPUj3+5FMIn8To94wa7g

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      ec4cdcf3df5952af29885abefd917f5a3b259cb396b4d0647cbeaf3f6ece0e79N

    • Size

      63KB

    • MD5

      79db8ef7c4252a7d381a065567f01df0

    • SHA1

      00ebab132db45027398b329c33f0cbd7c4b71fdc

    • SHA256

      ec4cdcf3df5952af29885abefd917f5a3b259cb396b4d0647cbeaf3f6ece0e79

    • SHA512

      f888aac835bf0b8014dbe5552058be94e8001c7dce0ed33df8acf71d9cc14b03db6ec7e43e918b73216b8fc23c94fe716ffa8b1138faba05447ca87d069e5814

    • SSDEEP

      1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrg:0PPUj3+5FMIn8To94wa7g

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks