General
-
Target
c048434decc83907a75813f87131f5605572b6d62a1d1a1dd82ed58c4b829568
-
Size
63KB
-
Sample
250106-hf269ayqbx
-
MD5
980f5debac3581032d20518c8a0b7205
-
SHA1
082d8153955efd17223be55a98e2710c37071fd8
-
SHA256
c048434decc83907a75813f87131f5605572b6d62a1d1a1dd82ed58c4b829568
-
SHA512
16b362f71bff65389161f2b207c15f1ed8962c0cf4e4a6112be0b42fbe9d96d332c7fb879a4297c4c83c2173edc32441021df7bcce2ed67502dae1efe09aaa78
-
SSDEEP
1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkry:0PPUj3+5FMIn8To94wa7y
Behavioral task
behavioral1
Sample
c048434decc83907a75813f87131f5605572b6d62a1d1a1dd82ed58c4b829568.exe
Resource
win7-20240903-en
Malware Config
Extracted
sakula
www.polarroute.com
Targets
-
-
Target
c048434decc83907a75813f87131f5605572b6d62a1d1a1dd82ed58c4b829568
-
Size
63KB
-
MD5
980f5debac3581032d20518c8a0b7205
-
SHA1
082d8153955efd17223be55a98e2710c37071fd8
-
SHA256
c048434decc83907a75813f87131f5605572b6d62a1d1a1dd82ed58c4b829568
-
SHA512
16b362f71bff65389161f2b207c15f1ed8962c0cf4e4a6112be0b42fbe9d96d332c7fb879a4297c4c83c2173edc32441021df7bcce2ed67502dae1efe09aaa78
-
SSDEEP
1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkry:0PPUj3+5FMIn8To94wa7y
-
Sakula family
-
Sakula payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1