General

  • Target

    864a1813d74482211a90b8de9634fe6a4a5dcbf02dafdd29a23e0f981a189dc4

  • Size

    63KB

  • Sample

    241110-afnpvsxrak

  • MD5

    52410702bab9bf2fb69dca88ed833795

  • SHA1

    b422575bc6bbe91add4d446e3c994fc82388de9c

  • SHA256

    864a1813d74482211a90b8de9634fe6a4a5dcbf02dafdd29a23e0f981a189dc4

  • SHA512

    c5d5878ece2a282b48d9693ac7cc620e5766eea08a7d1a7eab6f06ded9a446cb1d47a42b2c6301ee8cd063dbdae87746b9cb2e34699141ae7e674891e6aad306

  • SSDEEP

    1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrI:0PPUj3+5FMIn8To94wa7I

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      864a1813d74482211a90b8de9634fe6a4a5dcbf02dafdd29a23e0f981a189dc4

    • Size

      63KB

    • MD5

      52410702bab9bf2fb69dca88ed833795

    • SHA1

      b422575bc6bbe91add4d446e3c994fc82388de9c

    • SHA256

      864a1813d74482211a90b8de9634fe6a4a5dcbf02dafdd29a23e0f981a189dc4

    • SHA512

      c5d5878ece2a282b48d9693ac7cc620e5766eea08a7d1a7eab6f06ded9a446cb1d47a42b2c6301ee8cd063dbdae87746b9cb2e34699141ae7e674891e6aad306

    • SSDEEP

      1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrI:0PPUj3+5FMIn8To94wa7I

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks