General

  • Target

    4dea5bee395813bb10e623fdb4e05949b2846f50c63669b87af206a57bcd538b.exe

  • Size

    140KB

  • Sample

    241118-tke33a1akl

  • MD5

    10c05b2c7b11b2572e69de8b9efaf9dc

  • SHA1

    a15436472c87113b38fb6490aab86c7231d9f939

  • SHA256

    4dea5bee395813bb10e623fdb4e05949b2846f50c63669b87af206a57bcd538b

  • SHA512

    0736767a81a4cd26449c85cec0b0e427b556ba59e1ad60f891c8ce2b73b671e1220dc8059129314f758ce496286104d3002891227e70ee245c93e77cca6084aa

  • SSDEEP

    1536:6QFl29mEkE0L1rDEKrxZKF2zf9g2Pl7W/MwbxMX+mdz30rtr8gjmy9xNDCkre:x29DkEGRQixVSjLa130BYgjmy9T7e

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      4dea5bee395813bb10e623fdb4e05949b2846f50c63669b87af206a57bcd538b.exe

    • Size

      140KB

    • MD5

      10c05b2c7b11b2572e69de8b9efaf9dc

    • SHA1

      a15436472c87113b38fb6490aab86c7231d9f939

    • SHA256

      4dea5bee395813bb10e623fdb4e05949b2846f50c63669b87af206a57bcd538b

    • SHA512

      0736767a81a4cd26449c85cec0b0e427b556ba59e1ad60f891c8ce2b73b671e1220dc8059129314f758ce496286104d3002891227e70ee245c93e77cca6084aa

    • SSDEEP

      1536:6QFl29mEkE0L1rDEKrxZKF2zf9g2Pl7W/MwbxMX+mdz30rtr8gjmy9xNDCkre:x29DkEGRQixVSjLa130BYgjmy9T7e

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks