General
-
Target
3d1171ba005774ff600e2b8a0a30e653e0352c7f10a142584087e65654e7ae61
-
Size
63KB
-
Sample
250101-111g9sxjhy
-
MD5
3daa58cc6aa6706ce04df44818ceb3b5
-
SHA1
ae15e7975460189738ef4ed701438cde793d329a
-
SHA256
3d1171ba005774ff600e2b8a0a30e653e0352c7f10a142584087e65654e7ae61
-
SHA512
7254ba344b12d44fc11bb87d930247b5fcb14dfe96ccebef9abee16e30c4f686d05807064f1354de277e9014ae489e8329f3bf4eb95adfe9ad0fadeb9fa2b224
-
SSDEEP
1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrw:0PPUj3+5FMIn8To94wa7w
Behavioral task
behavioral1
Sample
3d1171ba005774ff600e2b8a0a30e653e0352c7f10a142584087e65654e7ae61.exe
Resource
win7-20240708-en
Malware Config
Extracted
sakula
www.polarroute.com
Targets
-
-
Target
3d1171ba005774ff600e2b8a0a30e653e0352c7f10a142584087e65654e7ae61
-
Size
63KB
-
MD5
3daa58cc6aa6706ce04df44818ceb3b5
-
SHA1
ae15e7975460189738ef4ed701438cde793d329a
-
SHA256
3d1171ba005774ff600e2b8a0a30e653e0352c7f10a142584087e65654e7ae61
-
SHA512
7254ba344b12d44fc11bb87d930247b5fcb14dfe96ccebef9abee16e30c4f686d05807064f1354de277e9014ae489e8329f3bf4eb95adfe9ad0fadeb9fa2b224
-
SSDEEP
1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrw:0PPUj3+5FMIn8To94wa7w
-
Sakula family
-
Sakula payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1