General

  • Target

    84c00741099c035fb5059cdb3da09afdc6b64d3b6433bbaca4e4a454ccff239a.exe

  • Size

    140KB

  • Sample

    241118-cyv8rsvrh1

  • MD5

    2cbb6c2d3a076aa2193f20ec11b87cc5

  • SHA1

    441c92fe90adf185d627410be0a9e0488e70afd4

  • SHA256

    84c00741099c035fb5059cdb3da09afdc6b64d3b6433bbaca4e4a454ccff239a

  • SHA512

    d5545484d339cde6264fac132a7524b2bd60a78b8641fd55a7734466eb473b027fceb12332136f608c25c573a50b50321f5925d475eb6102213b9c439e69537c

  • SSDEEP

    1536:6QFl29mEkE0L1rDEKrxZKF2zf9g2Pl7W/MwbxMX+mdz30rtr8gjmy9xNDCkr+:x29DkEGRQixVSjLa130BYgjmy9T7+

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      84c00741099c035fb5059cdb3da09afdc6b64d3b6433bbaca4e4a454ccff239a.exe

    • Size

      140KB

    • MD5

      2cbb6c2d3a076aa2193f20ec11b87cc5

    • SHA1

      441c92fe90adf185d627410be0a9e0488e70afd4

    • SHA256

      84c00741099c035fb5059cdb3da09afdc6b64d3b6433bbaca4e4a454ccff239a

    • SHA512

      d5545484d339cde6264fac132a7524b2bd60a78b8641fd55a7734466eb473b027fceb12332136f608c25c573a50b50321f5925d475eb6102213b9c439e69537c

    • SSDEEP

      1536:6QFl29mEkE0L1rDEKrxZKF2zf9g2Pl7W/MwbxMX+mdz30rtr8gjmy9xNDCkr+:x29DkEGRQixVSjLa130BYgjmy9T7+

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks