General
-
Target
15e6099dffcffe39a6311b3f00d1462614efb714621392f2350c21b2efc4d71cN.exe
-
Size
140KB
-
Sample
241219-yskqqsyjg1
-
MD5
1641e822ff2521dbf344db79f0267b90
-
SHA1
c25e28ba0dd376ceeab2cb2b959be8babc645190
-
SHA256
15e6099dffcffe39a6311b3f00d1462614efb714621392f2350c21b2efc4d71c
-
SHA512
0347b1cf5ebcf64bb7ca81c249c026219541669a25aa6f5a1f876f49185237460b14a820dd482be24ead26b6243d0ed4f74b6273ddffe0ee7d523a3115e6803b
-
SSDEEP
1536:6QFl29mEkE0L1rDEKrxZKF2zf9g2Pl7W/MwbxMX+mdz30rtr8gjmy9xNDCkrP:x29DkEGRQixVSjLa130BYgjmy9T7P
Behavioral task
behavioral1
Sample
15e6099dffcffe39a6311b3f00d1462614efb714621392f2350c21b2efc4d71cN.exe
Resource
win7-20240729-en
Malware Config
Extracted
sakula
www.polarroute.com
Targets
-
-
Target
15e6099dffcffe39a6311b3f00d1462614efb714621392f2350c21b2efc4d71cN.exe
-
Size
140KB
-
MD5
1641e822ff2521dbf344db79f0267b90
-
SHA1
c25e28ba0dd376ceeab2cb2b959be8babc645190
-
SHA256
15e6099dffcffe39a6311b3f00d1462614efb714621392f2350c21b2efc4d71c
-
SHA512
0347b1cf5ebcf64bb7ca81c249c026219541669a25aa6f5a1f876f49185237460b14a820dd482be24ead26b6243d0ed4f74b6273ddffe0ee7d523a3115e6803b
-
SSDEEP
1536:6QFl29mEkE0L1rDEKrxZKF2zf9g2Pl7W/MwbxMX+mdz30rtr8gjmy9xNDCkrP:x29DkEGRQixVSjLa130BYgjmy9T7P
-
Sakula family
-
Sakula payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1