General
-
Target
a4d5bad0f16fbe067a2dd7c616537f74674b90a721bf576199604dd0bd28ba39.exe
-
Size
140KB
-
Sample
241129-gqey2azjf1
-
MD5
fbf65d011592fd4f05ef7f91b39283cd
-
SHA1
6cb4890e4a12ca76f2e583d683b7db04a7ed4714
-
SHA256
a4d5bad0f16fbe067a2dd7c616537f74674b90a721bf576199604dd0bd28ba39
-
SHA512
0e4a414cc6a2179dfc286ed5caf2481b576875df4e3f2a49ba2c46ecf92748e589fee95dc6ae8ee894e4d5bfb3db5d0477b38d9f103bbd3eb5e727173cebf867
-
SSDEEP
1536:6QFl29mEkE0L1rDEKrxZKF2zf9g2Pl7W/MwbxMX+mdz30rtr8gjmy9xNDCkrZ:x29DkEGRQixVSjLa130BYgjmy9T7Z
Behavioral task
behavioral1
Sample
a4d5bad0f16fbe067a2dd7c616537f74674b90a721bf576199604dd0bd28ba39.exe
Resource
win7-20240903-en
Malware Config
Extracted
sakula
www.polarroute.com
Targets
-
-
Target
a4d5bad0f16fbe067a2dd7c616537f74674b90a721bf576199604dd0bd28ba39.exe
-
Size
140KB
-
MD5
fbf65d011592fd4f05ef7f91b39283cd
-
SHA1
6cb4890e4a12ca76f2e583d683b7db04a7ed4714
-
SHA256
a4d5bad0f16fbe067a2dd7c616537f74674b90a721bf576199604dd0bd28ba39
-
SHA512
0e4a414cc6a2179dfc286ed5caf2481b576875df4e3f2a49ba2c46ecf92748e589fee95dc6ae8ee894e4d5bfb3db5d0477b38d9f103bbd3eb5e727173cebf867
-
SSDEEP
1536:6QFl29mEkE0L1rDEKrxZKF2zf9g2Pl7W/MwbxMX+mdz30rtr8gjmy9xNDCkrZ:x29DkEGRQixVSjLa130BYgjmy9T7Z
-
Sakula family
-
Sakula payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1