General
-
Target
864a1813d74482211a90b8de9634fe6a4a5dcbf02dafdd29a23e0f981a189dc4
-
Size
63KB
-
Sample
241110-afnpvsxrak
-
MD5
52410702bab9bf2fb69dca88ed833795
-
SHA1
b422575bc6bbe91add4d446e3c994fc82388de9c
-
SHA256
864a1813d74482211a90b8de9634fe6a4a5dcbf02dafdd29a23e0f981a189dc4
-
SHA512
c5d5878ece2a282b48d9693ac7cc620e5766eea08a7d1a7eab6f06ded9a446cb1d47a42b2c6301ee8cd063dbdae87746b9cb2e34699141ae7e674891e6aad306
-
SSDEEP
1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrI:0PPUj3+5FMIn8To94wa7I
Behavioral task
behavioral1
Sample
864a1813d74482211a90b8de9634fe6a4a5dcbf02dafdd29a23e0f981a189dc4.exe
Resource
win7-20240903-en
Malware Config
Extracted
sakula
www.polarroute.com
Targets
-
-
Target
864a1813d74482211a90b8de9634fe6a4a5dcbf02dafdd29a23e0f981a189dc4
-
Size
63KB
-
MD5
52410702bab9bf2fb69dca88ed833795
-
SHA1
b422575bc6bbe91add4d446e3c994fc82388de9c
-
SHA256
864a1813d74482211a90b8de9634fe6a4a5dcbf02dafdd29a23e0f981a189dc4
-
SHA512
c5d5878ece2a282b48d9693ac7cc620e5766eea08a7d1a7eab6f06ded9a446cb1d47a42b2c6301ee8cd063dbdae87746b9cb2e34699141ae7e674891e6aad306
-
SSDEEP
1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrI:0PPUj3+5FMIn8To94wa7I
-
Sakula family
-
Sakula payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1