General

  • Target

    026c1857a08a0e34b8e1c2e3707050870bf018f04dc4213708fed97189a8977b.exe

  • Size

    63KB

  • Sample

    250111-grnybszqaq

  • MD5

    8b54a6bfa65db0a2df716b1e3406776a

  • SHA1

    8730d5d491dde7dcf996c4a77d3153f43674b777

  • SHA256

    026c1857a08a0e34b8e1c2e3707050870bf018f04dc4213708fed97189a8977b

  • SHA512

    a50b224f0d31727fd2250aef4f658ad7a6705589a9ddf29356968a51dd266245aabe7ab5add523e60fe83a98d77617226392b95ff37dbe64dbd723ea58185460

  • SSDEEP

    1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrl:0PPUj3+5FMIn8To94wa7l

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      026c1857a08a0e34b8e1c2e3707050870bf018f04dc4213708fed97189a8977b.exe

    • Size

      63KB

    • MD5

      8b54a6bfa65db0a2df716b1e3406776a

    • SHA1

      8730d5d491dde7dcf996c4a77d3153f43674b777

    • SHA256

      026c1857a08a0e34b8e1c2e3707050870bf018f04dc4213708fed97189a8977b

    • SHA512

      a50b224f0d31727fd2250aef4f658ad7a6705589a9ddf29356968a51dd266245aabe7ab5add523e60fe83a98d77617226392b95ff37dbe64dbd723ea58185460

    • SSDEEP

      1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrl:0PPUj3+5FMIn8To94wa7l

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks