General

  • Target

    a4d5bad0f16fbe067a2dd7c616537f74674b90a721bf576199604dd0bd28ba39.exe

  • Size

    140KB

  • Sample

    241129-gqey2azjf1

  • MD5

    fbf65d011592fd4f05ef7f91b39283cd

  • SHA1

    6cb4890e4a12ca76f2e583d683b7db04a7ed4714

  • SHA256

    a4d5bad0f16fbe067a2dd7c616537f74674b90a721bf576199604dd0bd28ba39

  • SHA512

    0e4a414cc6a2179dfc286ed5caf2481b576875df4e3f2a49ba2c46ecf92748e589fee95dc6ae8ee894e4d5bfb3db5d0477b38d9f103bbd3eb5e727173cebf867

  • SSDEEP

    1536:6QFl29mEkE0L1rDEKrxZKF2zf9g2Pl7W/MwbxMX+mdz30rtr8gjmy9xNDCkrZ:x29DkEGRQixVSjLa130BYgjmy9T7Z

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      a4d5bad0f16fbe067a2dd7c616537f74674b90a721bf576199604dd0bd28ba39.exe

    • Size

      140KB

    • MD5

      fbf65d011592fd4f05ef7f91b39283cd

    • SHA1

      6cb4890e4a12ca76f2e583d683b7db04a7ed4714

    • SHA256

      a4d5bad0f16fbe067a2dd7c616537f74674b90a721bf576199604dd0bd28ba39

    • SHA512

      0e4a414cc6a2179dfc286ed5caf2481b576875df4e3f2a49ba2c46ecf92748e589fee95dc6ae8ee894e4d5bfb3db5d0477b38d9f103bbd3eb5e727173cebf867

    • SSDEEP

      1536:6QFl29mEkE0L1rDEKrxZKF2zf9g2Pl7W/MwbxMX+mdz30rtr8gjmy9xNDCkrZ:x29DkEGRQixVSjLa130BYgjmy9T7Z

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks