Resubmissions

13-01-2025 03:28

250113-d1f3astlgw 10

12-01-2025 13:08

250112-qdqdnstkdz 10

General

  • Target

    1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe

  • Size

    63KB

  • Sample

    250112-qdqdnstkdz

  • MD5

    c798e56eadccbe80c166b9b7bfceaf05

  • SHA1

    60a9a6db2cabaec6476544dd1e9ddf2256c3497d

  • SHA256

    1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c

  • SHA512

    f3269d5a59f6f6d7817be2ee9a7c8954642c90df2fea3ffe9ac221d33925595ed48c22f4c2c69ecbd1a6691d7c45e8f417a874a6c3b2cca96f5fe0e41f7c97b8

  • SSDEEP

    1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrs:0PPUj3+5FMIn8To94wa7s

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe

    • Size

      63KB

    • MD5

      c798e56eadccbe80c166b9b7bfceaf05

    • SHA1

      60a9a6db2cabaec6476544dd1e9ddf2256c3497d

    • SHA256

      1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c

    • SHA512

      f3269d5a59f6f6d7817be2ee9a7c8954642c90df2fea3ffe9ac221d33925595ed48c22f4c2c69ecbd1a6691d7c45e8f417a874a6c3b2cca96f5fe0e41f7c97b8

    • SSDEEP

      1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrs:0PPUj3+5FMIn8To94wa7s

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks