General

  • Target

    d06418067aa9b147b20adf0b9b90e4db8a37c4055342d4eae488e2f44e17119aN.exe

  • Size

    63KB

  • Sample

    250108-3tggxsymcz

  • MD5

    3333f3e40b7a896e09263bbb50b072c0

  • SHA1

    6c47d0ab79933471ee748c95b70c3caae94cf3fc

  • SHA256

    d06418067aa9b147b20adf0b9b90e4db8a37c4055342d4eae488e2f44e17119a

  • SHA512

    c01146156aa6eda15072d6328b668de5f37760f1240e7b03893c5b99ee0c16bea9a3f312fbc349f549db45280ebd226b80a788c72bb9dc2ffb05682b62f7e698

  • SSDEEP

    1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrQ:0PPUj3+5FMIn8To94wa7Q

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      d06418067aa9b147b20adf0b9b90e4db8a37c4055342d4eae488e2f44e17119aN.exe

    • Size

      63KB

    • MD5

      3333f3e40b7a896e09263bbb50b072c0

    • SHA1

      6c47d0ab79933471ee748c95b70c3caae94cf3fc

    • SHA256

      d06418067aa9b147b20adf0b9b90e4db8a37c4055342d4eae488e2f44e17119a

    • SHA512

      c01146156aa6eda15072d6328b668de5f37760f1240e7b03893c5b99ee0c16bea9a3f312fbc349f549db45280ebd226b80a788c72bb9dc2ffb05682b62f7e698

    • SSDEEP

      1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrQ:0PPUj3+5FMIn8To94wa7Q

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks