General

  • Target

    2cbb6c2d3a076aa2193f20ec11b87cc5.bin

  • Size

    53KB

  • Sample

    241119-bgy3naygrk

  • MD5

    96d870564805969762f7016fdf9377b1

  • SHA1

    364f53f6b4abd98f3d504712df2844e1c525181c

  • SHA256

    c94d6accdf2ddc30786c847d2be266a4d4ba8f0c842685f325490934f7320456

  • SHA512

    40492c6995cf70185f8faab96dbf92fcd03e621ad979d9f1d6105c391061eba2bc277a144eeb47c88de22d65a7d6ac5a8975e5cca5ff163cc0174b5fa131f22a

  • SSDEEP

    1536:nsaQGFwlqDTb88w95zbS7XFQkStTNFIaBhj4q9p/:nP3FwlqDTb88KbS71QkSR1BRp/

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      84c00741099c035fb5059cdb3da09afdc6b64d3b6433bbaca4e4a454ccff239a.exe

    • Size

      140KB

    • MD5

      2cbb6c2d3a076aa2193f20ec11b87cc5

    • SHA1

      441c92fe90adf185d627410be0a9e0488e70afd4

    • SHA256

      84c00741099c035fb5059cdb3da09afdc6b64d3b6433bbaca4e4a454ccff239a

    • SHA512

      d5545484d339cde6264fac132a7524b2bd60a78b8641fd55a7734466eb473b027fceb12332136f608c25c573a50b50321f5925d475eb6102213b9c439e69537c

    • SSDEEP

      1536:6QFl29mEkE0L1rDEKrxZKF2zf9g2Pl7W/MwbxMX+mdz30rtr8gjmy9xNDCkr+:x29DkEGRQixVSjLa130BYgjmy9T7+

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks