General

  • Target

    9ca5750bad9eff7f6fbacdd03604c2f11e7b1f1f1f0dab75c7563dd57ad84a92N.exe

  • Size

    105KB

  • Sample

    241201-tn5g5awjbv

  • MD5

    83387f86b8793458621a213cd3e506c0

  • SHA1

    e188f4bafd0f7dd2e348d202c188b911fcc916a2

  • SHA256

    9ca5750bad9eff7f6fbacdd03604c2f11e7b1f1f1f0dab75c7563dd57ad84a92

  • SHA512

    317b6749b63b49dc4108c6eb81cf095920be6e27df59968114f90344e3d3edae6c4abcd2e9ec67ce0d4cf746a30002e9ad9c12290ac4fc1ab331d580cc2ce048

  • SSDEEP

    1536:anRw3vN6mG1y8nRB8aX3DVwd4sSH2/fTMLkKFTeUCD+xFOOf4EVRMLfsUP:aCv48aHDCz/LUkwedD+MLfsQ

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      9ca5750bad9eff7f6fbacdd03604c2f11e7b1f1f1f0dab75c7563dd57ad84a92N.exe

    • Size

      105KB

    • MD5

      83387f86b8793458621a213cd3e506c0

    • SHA1

      e188f4bafd0f7dd2e348d202c188b911fcc916a2

    • SHA256

      9ca5750bad9eff7f6fbacdd03604c2f11e7b1f1f1f0dab75c7563dd57ad84a92

    • SHA512

      317b6749b63b49dc4108c6eb81cf095920be6e27df59968114f90344e3d3edae6c4abcd2e9ec67ce0d4cf746a30002e9ad9c12290ac4fc1ab331d580cc2ce048

    • SSDEEP

      1536:anRw3vN6mG1y8nRB8aX3DVwd4sSH2/fTMLkKFTeUCD+xFOOf4EVRMLfsUP:aCv48aHDCz/LUkwedD+MLfsQ

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks