General

  • Target

    f0045d038313a8a7bc103f0f515ea05238ae802e17eb6a88d2bb5d75c07444d6

  • Size

    140KB

  • Sample

    241103-gvq7vsxbph

  • MD5

    818144233f644544b8622dd62909eb92

  • SHA1

    565750fa8c9ccec07d06bb4885a3d0adda1d545e

  • SHA256

    f0045d038313a8a7bc103f0f515ea05238ae802e17eb6a88d2bb5d75c07444d6

  • SHA512

    aee2583b6679ed66e818ac1908215cb1a629193403a22a04e50164739ea886df2cd2d640f42be6dc29653b98fab7f2520a31d8b1918bce3e0580a1e982d5a201

  • SSDEEP

    1536:6QFl29mEkE0L1rDEKrxZKF2zf9g2Pl7W/MwbxMX+mdz30rtr8gjmy9xNDCkr7:x29DkEGRQixVSjLa130BYgjmy9T77

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      f0045d038313a8a7bc103f0f515ea05238ae802e17eb6a88d2bb5d75c07444d6

    • Size

      140KB

    • MD5

      818144233f644544b8622dd62909eb92

    • SHA1

      565750fa8c9ccec07d06bb4885a3d0adda1d545e

    • SHA256

      f0045d038313a8a7bc103f0f515ea05238ae802e17eb6a88d2bb5d75c07444d6

    • SHA512

      aee2583b6679ed66e818ac1908215cb1a629193403a22a04e50164739ea886df2cd2d640f42be6dc29653b98fab7f2520a31d8b1918bce3e0580a1e982d5a201

    • SSDEEP

      1536:6QFl29mEkE0L1rDEKrxZKF2zf9g2Pl7W/MwbxMX+mdz30rtr8gjmy9xNDCkr7:x29DkEGRQixVSjLa130BYgjmy9T77

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks