General
-
Target
319a2b33c352fe6f91b6ab0feaac1c0b765dfce5b5c0dbc845f64c0c0e6cc0c0
-
Size
41KB
-
Sample
250113-2h5vpssjcr
-
MD5
50de155ac587f1c288849ceb0e3e6b66
-
SHA1
d2162b11bda6e812410309592148d500eba15ecf
-
SHA256
319a2b33c352fe6f91b6ab0feaac1c0b765dfce5b5c0dbc845f64c0c0e6cc0c0
-
SHA512
f844a548e584ca4e24b510ee811900353d9cdc03f1d20d0b8ec917c854974d25b845bf2b0945b8ec56e3dbbdf82cd1f3f26f416112d2dffadb5c31574d5b3e07
-
SSDEEP
768:9zpVJi5kPTIukEYpcHOZ6rFSBZxkXNVkSXtfgn3JkcBwQoabJF7nbcuyD7UQ:N/JKiMLE9bOq5fgn6Ozoaz7nouy8Q
Behavioral task
behavioral1
Sample
319a2b33c352fe6f91b6ab0feaac1c0b765dfce5b5c0dbc845f64c0c0e6cc0c0.exe
Resource
win7-20240903-en
Malware Config
Extracted
sakula
www.polarroute.com
Targets
-
-
Target
319a2b33c352fe6f91b6ab0feaac1c0b765dfce5b5c0dbc845f64c0c0e6cc0c0
-
Size
41KB
-
MD5
50de155ac587f1c288849ceb0e3e6b66
-
SHA1
d2162b11bda6e812410309592148d500eba15ecf
-
SHA256
319a2b33c352fe6f91b6ab0feaac1c0b765dfce5b5c0dbc845f64c0c0e6cc0c0
-
SHA512
f844a548e584ca4e24b510ee811900353d9cdc03f1d20d0b8ec917c854974d25b845bf2b0945b8ec56e3dbbdf82cd1f3f26f416112d2dffadb5c31574d5b3e07
-
SSDEEP
768:9zpVJi5kPTIukEYpcHOZ6rFSBZxkXNVkSXtfgn3JkcBwQoabJF7nbcuyD7UQ:N/JKiMLE9bOq5fgn6Ozoaz7nouy8Q
-
Sakula family
-
Sakula payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1