General

  • Target

    8fef65caaf2b0fe09e7ddcef437bbe346821db5a5f73af0405acdc0406790267N

  • Size

    63KB

  • Sample

    241110-l8brjsxqej

  • MD5

    73717d06995a58fc876922f6373c2410

  • SHA1

    05f3bd056fc9ca1818f97e73c8b3f2cff691410d

  • SHA256

    8fef65caaf2b0fe09e7ddcef437bbe346821db5a5f73af0405acdc0406790267

  • SHA512

    c1e4d5efa45e03f9e8b8a73399f746e4e24bc4dde9a42ec8ec5684ec850223c66fa06e3081633544a2fa7258c1a27470f87354eefcc0c70089a824965c27fa6e

  • SSDEEP

    1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrs:0PPUj3+5FMIn8To94wa7s

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      8fef65caaf2b0fe09e7ddcef437bbe346821db5a5f73af0405acdc0406790267N

    • Size

      63KB

    • MD5

      73717d06995a58fc876922f6373c2410

    • SHA1

      05f3bd056fc9ca1818f97e73c8b3f2cff691410d

    • SHA256

      8fef65caaf2b0fe09e7ddcef437bbe346821db5a5f73af0405acdc0406790267

    • SHA512

      c1e4d5efa45e03f9e8b8a73399f746e4e24bc4dde9a42ec8ec5684ec850223c66fa06e3081633544a2fa7258c1a27470f87354eefcc0c70089a824965c27fa6e

    • SSDEEP

      1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrs:0PPUj3+5FMIn8To94wa7s

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks