General

  • Target

    8bcc8d8a9f44c63c45e3f05813c25014c1c06c31181f91b08d3432d210d06f76.exe

  • Size

    63KB

  • Sample

    241206-jh96bawrhw

  • MD5

    dae1498fc77900d436e67fb25c5c0184

  • SHA1

    e4e8932804597bf4fa5f37c9cd32731ea2f65bb9

  • SHA256

    8bcc8d8a9f44c63c45e3f05813c25014c1c06c31181f91b08d3432d210d06f76

  • SHA512

    981a2025f43c8cc78d5d5eb9d9830bd6621fcc985c4477001139995e370286a7b7a57b8219d47b39f49dcecec54f018b0103591a2360392999c2aa3cc8f6cfa9

  • SSDEEP

    1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrO:0PPUj3+5FMIn8To94wa7O

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      8bcc8d8a9f44c63c45e3f05813c25014c1c06c31181f91b08d3432d210d06f76.exe

    • Size

      63KB

    • MD5

      dae1498fc77900d436e67fb25c5c0184

    • SHA1

      e4e8932804597bf4fa5f37c9cd32731ea2f65bb9

    • SHA256

      8bcc8d8a9f44c63c45e3f05813c25014c1c06c31181f91b08d3432d210d06f76

    • SHA512

      981a2025f43c8cc78d5d5eb9d9830bd6621fcc985c4477001139995e370286a7b7a57b8219d47b39f49dcecec54f018b0103591a2360392999c2aa3cc8f6cfa9

    • SSDEEP

      1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrO:0PPUj3+5FMIn8To94wa7O

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks