General
-
Target
c1e5f6306ad002c1b1710e3ce56c47a5b9c782453d4672089c610ecb450c49b1N.exe
-
Size
63KB
-
Sample
250104-slfkjsvkcx
-
MD5
923dc2254955cd7ebc40769fb2d5c6e0
-
SHA1
bc4141495d76a3ef82a7e441fcfa9ca362a223fc
-
SHA256
c1e5f6306ad002c1b1710e3ce56c47a5b9c782453d4672089c610ecb450c49b1
-
SHA512
42021a5272a5c5cba28bef8608468b66cca3021bb50ea51dede39cdfd39d077b1d06f785bc0e5b941bfa9365aad84acd64b82001617ff000825afd022242c2d1
-
SSDEEP
1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrS:0PPUj3+5FMIn8To94wa7S
Behavioral task
behavioral1
Sample
c1e5f6306ad002c1b1710e3ce56c47a5b9c782453d4672089c610ecb450c49b1N.exe
Resource
win7-20241023-en
Malware Config
Extracted
sakula
www.polarroute.com
Targets
-
-
Target
c1e5f6306ad002c1b1710e3ce56c47a5b9c782453d4672089c610ecb450c49b1N.exe
-
Size
63KB
-
MD5
923dc2254955cd7ebc40769fb2d5c6e0
-
SHA1
bc4141495d76a3ef82a7e441fcfa9ca362a223fc
-
SHA256
c1e5f6306ad002c1b1710e3ce56c47a5b9c782453d4672089c610ecb450c49b1
-
SHA512
42021a5272a5c5cba28bef8608468b66cca3021bb50ea51dede39cdfd39d077b1d06f785bc0e5b941bfa9365aad84acd64b82001617ff000825afd022242c2d1
-
SSDEEP
1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrS:0PPUj3+5FMIn8To94wa7S
-
Sakula family
-
Sakula payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1