General

  • Target

    0c136d8a243958989de0f26bb51e8d4b257eacae52c1ab1ea122189d49872a09N

  • Size

    63KB

  • Sample

    241029-ankyyaylht

  • MD5

    75a64a52d5215fcfe7b0f531f7600610

  • SHA1

    251e087211178ab4d72bdf25753f85824ee2d69e

  • SHA256

    0c136d8a243958989de0f26bb51e8d4b257eacae52c1ab1ea122189d49872a09

  • SHA512

    f7aa0f1a87ea958b0421267c67edb973a265e9a28ed6691edd7c04065fda7f064f4418277f1851307d6caba4c417e5bfaf8f604af1a613d907ecc8dda3068b32

  • SSDEEP

    1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrq:0PPUj3+5FMIn8To94wa7q

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      0c136d8a243958989de0f26bb51e8d4b257eacae52c1ab1ea122189d49872a09N

    • Size

      63KB

    • MD5

      75a64a52d5215fcfe7b0f531f7600610

    • SHA1

      251e087211178ab4d72bdf25753f85824ee2d69e

    • SHA256

      0c136d8a243958989de0f26bb51e8d4b257eacae52c1ab1ea122189d49872a09

    • SHA512

      f7aa0f1a87ea958b0421267c67edb973a265e9a28ed6691edd7c04065fda7f064f4418277f1851307d6caba4c417e5bfaf8f604af1a613d907ecc8dda3068b32

    • SSDEEP

      1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrq:0PPUj3+5FMIn8To94wa7q

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks