General

  • Target

    e6ac2f785fbe5afdc3744d6ae77ae22591d96e52a3319ffe524a4c1fb51d1f2c.exe

  • Size

    63KB

  • Sample

    241231-cbcsxaxrbq

  • MD5

    f2dd835cd8ad0faa33385f107e59b7b0

  • SHA1

    2c658e5df5c4ac2f5507dbf5b51b2d9b0d427aee

  • SHA256

    e6ac2f785fbe5afdc3744d6ae77ae22591d96e52a3319ffe524a4c1fb51d1f2c

  • SHA512

    c002d122de41f23e51ab5929eb92d97648da694c6fa08c9f22f3ee8e72e2a415177930ed3676db5f9107b4b63cc72f29f58a83156910d4297937ecc4ba5ba3cb

  • SSDEEP

    1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrp:0PPUj3+5FMIn8To94wa7p

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      e6ac2f785fbe5afdc3744d6ae77ae22591d96e52a3319ffe524a4c1fb51d1f2c.exe

    • Size

      63KB

    • MD5

      f2dd835cd8ad0faa33385f107e59b7b0

    • SHA1

      2c658e5df5c4ac2f5507dbf5b51b2d9b0d427aee

    • SHA256

      e6ac2f785fbe5afdc3744d6ae77ae22591d96e52a3319ffe524a4c1fb51d1f2c

    • SHA512

      c002d122de41f23e51ab5929eb92d97648da694c6fa08c9f22f3ee8e72e2a415177930ed3676db5f9107b4b63cc72f29f58a83156910d4297937ecc4ba5ba3cb

    • SSDEEP

      1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrp:0PPUj3+5FMIn8To94wa7p

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks