General

  • Target

    7a329ca71bf6e1b67e4a525429d5176b3dbc6b1709f02e1f643220c036017cbfN

  • Size

    89KB

  • Sample

    241103-z42n3axmam

  • MD5

    d428c6faf1aa8e4948d52da342014e80

  • SHA1

    c6a3780dfb87552b655ff0ad2d214576780d71ed

  • SHA256

    7a329ca71bf6e1b67e4a525429d5176b3dbc6b1709f02e1f643220c036017cbf

  • SHA512

    53987c1438437f48ba426cf93a50659e9f009fda3fbbbc151084b3e222689cb9bfd449c7a59bca6433f91611967fe69b13a779d21ab61b178f363a64574e6762

  • SSDEEP

    1536:PQFl29mEkE0L1rDEKrxZKF2zf9g2Pl7W/MwbxMX+ees52z30rtrF:w29DkEGRQixVSjLaes5G30Bp

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      7a329ca71bf6e1b67e4a525429d5176b3dbc6b1709f02e1f643220c036017cbfN

    • Size

      89KB

    • MD5

      d428c6faf1aa8e4948d52da342014e80

    • SHA1

      c6a3780dfb87552b655ff0ad2d214576780d71ed

    • SHA256

      7a329ca71bf6e1b67e4a525429d5176b3dbc6b1709f02e1f643220c036017cbf

    • SHA512

      53987c1438437f48ba426cf93a50659e9f009fda3fbbbc151084b3e222689cb9bfd449c7a59bca6433f91611967fe69b13a779d21ab61b178f363a64574e6762

    • SSDEEP

      1536:PQFl29mEkE0L1rDEKrxZKF2zf9g2Pl7W/MwbxMX+ees52z30rtrF:w29DkEGRQixVSjLaes5G30Bp

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks