General
-
Target
36bb80d0e1bc5ce02a22127b83bcc5d3d477907362e5a7c4a971d92077bfc4c6N.exe
-
Size
63KB
-
Sample
250110-2tt8catqfk
-
MD5
79f55a093d60bba0e0e2b646da644250
-
SHA1
1edc5cd4a01762e519f437d3b4b2b669447838f3
-
SHA256
36bb80d0e1bc5ce02a22127b83bcc5d3d477907362e5a7c4a971d92077bfc4c6
-
SHA512
d10709cc7aab0ecd372a1e257fc2c497a55d49a3d1e46ddcb88dc70c8cc1127c841c0952c43eccd8346b0c2e851c63dc56dc7f43a1368c621a266300cbe7e6ba
-
SSDEEP
1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrF:0PPUj3+5FMIn8To94wa7F
Behavioral task
behavioral1
Sample
36bb80d0e1bc5ce02a22127b83bcc5d3d477907362e5a7c4a971d92077bfc4c6N.exe
Resource
win7-20240903-en
Malware Config
Extracted
sakula
www.polarroute.com
Targets
-
-
Target
36bb80d0e1bc5ce02a22127b83bcc5d3d477907362e5a7c4a971d92077bfc4c6N.exe
-
Size
63KB
-
MD5
79f55a093d60bba0e0e2b646da644250
-
SHA1
1edc5cd4a01762e519f437d3b4b2b669447838f3
-
SHA256
36bb80d0e1bc5ce02a22127b83bcc5d3d477907362e5a7c4a971d92077bfc4c6
-
SHA512
d10709cc7aab0ecd372a1e257fc2c497a55d49a3d1e46ddcb88dc70c8cc1127c841c0952c43eccd8346b0c2e851c63dc56dc7f43a1368c621a266300cbe7e6ba
-
SSDEEP
1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrF:0PPUj3+5FMIn8To94wa7F
-
Sakula family
-
Sakula payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1