General

  • Target

    065825b82dcf16f3797a8d0b3766b3954c68dfde3f5a1302b1bc3ad98e305764N

  • Size

    63KB

  • Sample

    241102-pjdfmawqgp

  • MD5

    611bacbc29c9e322fad229f3f8b757b0

  • SHA1

    e0dfb00a1daf7a358d719270e0926791bc83a864

  • SHA256

    065825b82dcf16f3797a8d0b3766b3954c68dfde3f5a1302b1bc3ad98e305764

  • SHA512

    79ba51e2d32c88bebc98b181ad79a0f724d21c5be267fe850a66f2d838bb0374212d871e0fc6d3ffaea202ef152e9757692358efca884beba59086e0ba4f7954

  • SSDEEP

    1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrB:0PPUj3+5FMIn8To94wa7B

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      065825b82dcf16f3797a8d0b3766b3954c68dfde3f5a1302b1bc3ad98e305764N

    • Size

      63KB

    • MD5

      611bacbc29c9e322fad229f3f8b757b0

    • SHA1

      e0dfb00a1daf7a358d719270e0926791bc83a864

    • SHA256

      065825b82dcf16f3797a8d0b3766b3954c68dfde3f5a1302b1bc3ad98e305764

    • SHA512

      79ba51e2d32c88bebc98b181ad79a0f724d21c5be267fe850a66f2d838bb0374212d871e0fc6d3ffaea202ef152e9757692358efca884beba59086e0ba4f7954

    • SSDEEP

      1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrB:0PPUj3+5FMIn8To94wa7B

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks