General

  • Target

    e5aa16fc7f8de9332114abd2bdf6933e_JaffaCakes118

  • Size

    517KB

  • Sample

    241212-k2w88syqdv

  • MD5

    e5aa16fc7f8de9332114abd2bdf6933e

  • SHA1

    e9080923125f26646fb1c79969faff6d49f4deb3

  • SHA256

    7d7bda2af166bbc9816b3bb42cb9c47368d2d375b557637ae5ec5cd3b83cb935

  • SHA512

    eba49a45ada556df250b31af93dd455b891c97848f5f8736441377c4dde1a206d58c81e343e900070aed36461067a3850a52e271007789c8b2892efe7c32e719

  • SSDEEP

    12288:0RfQn+w8EYiBlMkn5f9J105ko8T6csVel:g4+wlYBsb3zNs8

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      e5aa16fc7f8de9332114abd2bdf6933e_JaffaCakes118

    • Size

      517KB

    • MD5

      e5aa16fc7f8de9332114abd2bdf6933e

    • SHA1

      e9080923125f26646fb1c79969faff6d49f4deb3

    • SHA256

      7d7bda2af166bbc9816b3bb42cb9c47368d2d375b557637ae5ec5cd3b83cb935

    • SHA512

      eba49a45ada556df250b31af93dd455b891c97848f5f8736441377c4dde1a206d58c81e343e900070aed36461067a3850a52e271007789c8b2892efe7c32e719

    • SSDEEP

      12288:0RfQn+w8EYiBlMkn5f9J105ko8T6csVel:g4+wlYBsb3zNs8

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks