General

  • Target

    8864351aede3fd8cdfc8c96e0a9ef5a26b4bfef63346728aa5207e5a227c87c1.exe

  • Size

    41KB

  • Sample

    250115-2qwxrsykbw

  • MD5

    65bd22d3cf27bbed3e8d437764e65343

  • SHA1

    b682e23ac7fafe862aad600192c9a97a38667dca

  • SHA256

    8864351aede3fd8cdfc8c96e0a9ef5a26b4bfef63346728aa5207e5a227c87c1

  • SHA512

    51a056bd65e6ed90a75c088c1f9a7f56974d81fedd851266d579953a44e36b6003941de8832852057ac2f891dd43bd32ade0fa14e3b391636686f757f9008466

  • SSDEEP

    768:9zpVJi5kPTIukEYpcHOZ6rFSBZxkXNVkSXtfgn3JkcBwQoabJF7nbcuyD7UT:N/JKiMLE9bOq5fgn6Ozoaz7nouy8T

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      8864351aede3fd8cdfc8c96e0a9ef5a26b4bfef63346728aa5207e5a227c87c1.exe

    • Size

      41KB

    • MD5

      65bd22d3cf27bbed3e8d437764e65343

    • SHA1

      b682e23ac7fafe862aad600192c9a97a38667dca

    • SHA256

      8864351aede3fd8cdfc8c96e0a9ef5a26b4bfef63346728aa5207e5a227c87c1

    • SHA512

      51a056bd65e6ed90a75c088c1f9a7f56974d81fedd851266d579953a44e36b6003941de8832852057ac2f891dd43bd32ade0fa14e3b391636686f757f9008466

    • SSDEEP

      768:9zpVJi5kPTIukEYpcHOZ6rFSBZxkXNVkSXtfgn3JkcBwQoabJF7nbcuyD7UT:N/JKiMLE9bOq5fgn6Ozoaz7nouy8T

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks