General

  • Target

    JaffaCakes118_073c8c5af6e58b26e37a0eecf710fca8

  • Size

    304KB

  • Sample

    241231-gfy9xszrgt

  • MD5

    073c8c5af6e58b26e37a0eecf710fca8

  • SHA1

    318114cd9f3df0372853a95e600554f72c17f370

  • SHA256

    9b850afa7127b59a4f8c55d96e007b196eae62962f4219c3b52dabdfde405fd8

  • SHA512

    c10c5e48042fbc6badd7366c4c862f8dd4e76578f6cc0b0c366c425f2be601a318ea4d3e7c225e7356ea09f264217544c15658bca9c968b51e9732606e96481f

  • SSDEEP

    6144:M29qRfVSndj30B3wBxE1+ijiBKk3etdgI2MyzNORQtOfl1qNVo7R+S+N//:0RfQn+w8EYiBlr

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      JaffaCakes118_073c8c5af6e58b26e37a0eecf710fca8

    • Size

      304KB

    • MD5

      073c8c5af6e58b26e37a0eecf710fca8

    • SHA1

      318114cd9f3df0372853a95e600554f72c17f370

    • SHA256

      9b850afa7127b59a4f8c55d96e007b196eae62962f4219c3b52dabdfde405fd8

    • SHA512

      c10c5e48042fbc6badd7366c4c862f8dd4e76578f6cc0b0c366c425f2be601a318ea4d3e7c225e7356ea09f264217544c15658bca9c968b51e9732606e96481f

    • SSDEEP

      6144:M29qRfVSndj30B3wBxE1+ijiBKk3etdgI2MyzNORQtOfl1qNVo7R+S+N//:0RfQn+w8EYiBlr

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks