General

  • Target

    ab4d2a65ef902b5baa4af2f2efc961bb9e05a52373861b7f869ef81c93451d9eN.exe

  • Size

    140KB

  • Sample

    241127-ddq9ratkbz

  • MD5

    5be18cfd18903dd0556eb93649ad8390

  • SHA1

    803b265533f5cca1242e6ebe907cfc6a584693bd

  • SHA256

    ab4d2a65ef902b5baa4af2f2efc961bb9e05a52373861b7f869ef81c93451d9e

  • SHA512

    8a8f68b2bb9efaae17d4b0e4a1d4ac0fbcacdbf0106f9a1c168fb4ef8c5f209c71c0736f22690dc0e78fa2e59aee3cc752f506b9aa264b17f6c76b8f2b8abe35

  • SSDEEP

    1536:6QFl29mEkE0L1rDEKrxZKF2zf9g2Pl7W/MwbxMX+mdz30rtr8gjmy9xNDCkrR:x29DkEGRQixVSjLa130BYgjmy9T7R

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      ab4d2a65ef902b5baa4af2f2efc961bb9e05a52373861b7f869ef81c93451d9eN.exe

    • Size

      140KB

    • MD5

      5be18cfd18903dd0556eb93649ad8390

    • SHA1

      803b265533f5cca1242e6ebe907cfc6a584693bd

    • SHA256

      ab4d2a65ef902b5baa4af2f2efc961bb9e05a52373861b7f869ef81c93451d9e

    • SHA512

      8a8f68b2bb9efaae17d4b0e4a1d4ac0fbcacdbf0106f9a1c168fb4ef8c5f209c71c0736f22690dc0e78fa2e59aee3cc752f506b9aa264b17f6c76b8f2b8abe35

    • SSDEEP

      1536:6QFl29mEkE0L1rDEKrxZKF2zf9g2Pl7W/MwbxMX+mdz30rtr8gjmy9xNDCkrR:x29DkEGRQixVSjLa130BYgjmy9T7R

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks