General

  • Target

    36bb80d0e1bc5ce02a22127b83bcc5d3d477907362e5a7c4a971d92077bfc4c6N.exe

  • Size

    63KB

  • Sample

    250110-2tt8catqfk

  • MD5

    79f55a093d60bba0e0e2b646da644250

  • SHA1

    1edc5cd4a01762e519f437d3b4b2b669447838f3

  • SHA256

    36bb80d0e1bc5ce02a22127b83bcc5d3d477907362e5a7c4a971d92077bfc4c6

  • SHA512

    d10709cc7aab0ecd372a1e257fc2c497a55d49a3d1e46ddcb88dc70c8cc1127c841c0952c43eccd8346b0c2e851c63dc56dc7f43a1368c621a266300cbe7e6ba

  • SSDEEP

    1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrF:0PPUj3+5FMIn8To94wa7F

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      36bb80d0e1bc5ce02a22127b83bcc5d3d477907362e5a7c4a971d92077bfc4c6N.exe

    • Size

      63KB

    • MD5

      79f55a093d60bba0e0e2b646da644250

    • SHA1

      1edc5cd4a01762e519f437d3b4b2b669447838f3

    • SHA256

      36bb80d0e1bc5ce02a22127b83bcc5d3d477907362e5a7c4a971d92077bfc4c6

    • SHA512

      d10709cc7aab0ecd372a1e257fc2c497a55d49a3d1e46ddcb88dc70c8cc1127c841c0952c43eccd8346b0c2e851c63dc56dc7f43a1368c621a266300cbe7e6ba

    • SSDEEP

      1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrF:0PPUj3+5FMIn8To94wa7F

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks