General

  • Target

    b1e7be2bb326144fb528f105795e4c3b602b3c28db7a3a0fd8cf5487938ec137.exe

  • Size

    3.6MB

  • Sample

    241120-yh42ma1gmb

  • MD5

    1cc7c63af4eb7e2c5463c1f7f6dc8e40

  • SHA1

    197ef0e34d392ebd7b3aa7cc38836064be833d4c

  • SHA256

    b1e7be2bb326144fb528f105795e4c3b602b3c28db7a3a0fd8cf5487938ec137

  • SHA512

    97635987be402ed195a9d790fcc0b59b3b7c41a45dfd2448e0d03394b817e98daff41a0da6ccd5031d4ea8501648f0a74e4f9863eab66d528b322460aa0f6273

  • SSDEEP

    49152:o852ZjeUNZZH46HsnHVT5ZA+acdD6xXTI8:oU6eUNZZJHsHu

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      b1e7be2bb326144fb528f105795e4c3b602b3c28db7a3a0fd8cf5487938ec137.exe

    • Size

      3.6MB

    • MD5

      1cc7c63af4eb7e2c5463c1f7f6dc8e40

    • SHA1

      197ef0e34d392ebd7b3aa7cc38836064be833d4c

    • SHA256

      b1e7be2bb326144fb528f105795e4c3b602b3c28db7a3a0fd8cf5487938ec137

    • SHA512

      97635987be402ed195a9d790fcc0b59b3b7c41a45dfd2448e0d03394b817e98daff41a0da6ccd5031d4ea8501648f0a74e4f9863eab66d528b322460aa0f6273

    • SSDEEP

      49152:o852ZjeUNZZH46HsnHVT5ZA+acdD6xXTI8:oU6eUNZZJHsHu

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks