General
-
Target
921144b30af479c4e37facec34be76e77c707bc6b2787d2e091f843d7354b340
-
Size
41KB
-
Sample
250113-dwhqbstkcw
-
MD5
b1b42556c441f64276725c25bf916831
-
SHA1
b69747a088db3a41e7d891aaae746306d35e387a
-
SHA256
921144b30af479c4e37facec34be76e77c707bc6b2787d2e091f843d7354b340
-
SHA512
7a6e8164f2c20342154eeabe46dd012b649983dec38d2f3c647bfa1b728ea2ecad9d06ff0cdecd3c27e829f636a6f773789336db2e25f00f98d685ff21f62df4
-
SSDEEP
768:9zpVJi5kPTIukEYpcHOZ6rFSBZxkXNVkSXtfgn3JkcBwQoabJF7nbcuyD7UV:N/JKiMLE9bOq5fgn6Ozoaz7nouy8V
Behavioral task
behavioral1
Sample
921144b30af479c4e37facec34be76e77c707bc6b2787d2e091f843d7354b340.exe
Resource
win7-20241010-en
Malware Config
Extracted
sakula
www.polarroute.com
Targets
-
-
Target
921144b30af479c4e37facec34be76e77c707bc6b2787d2e091f843d7354b340
-
Size
41KB
-
MD5
b1b42556c441f64276725c25bf916831
-
SHA1
b69747a088db3a41e7d891aaae746306d35e387a
-
SHA256
921144b30af479c4e37facec34be76e77c707bc6b2787d2e091f843d7354b340
-
SHA512
7a6e8164f2c20342154eeabe46dd012b649983dec38d2f3c647bfa1b728ea2ecad9d06ff0cdecd3c27e829f636a6f773789336db2e25f00f98d685ff21f62df4
-
SSDEEP
768:9zpVJi5kPTIukEYpcHOZ6rFSBZxkXNVkSXtfgn3JkcBwQoabJF7nbcuyD7UV:N/JKiMLE9bOq5fgn6Ozoaz7nouy8V
-
Sakula family
-
Sakula payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1