General

  • Target

    3444ac001a286b482e37b962667a66a4dea4488a53699445ace18af8ba062e90.exe

  • Size

    220KB

  • Sample

    250116-3sstkavlfy

  • MD5

    7553b607fb939e371d7e165e2a5c45e0

  • SHA1

    a96097034705d598414055099b31cead78e342dd

  • SHA256

    3444ac001a286b482e37b962667a66a4dea4488a53699445ace18af8ba062e90

  • SHA512

    1520855d18b5716acb5af88e599cea594d8767ecb7851b905c9714fcd6891f3f5722ce31c99dd6e234e2fc87c04da76fec76f93577ede96b884b92963d3026d8

  • SSDEEP

    3072:M29DkEGRQixVSjLwes5G30Bg7uZwOuz/xS3iGpZMhDEXzkOSUUKeF8a7bXb:M29qRfVSndj30B3wBxE1+ijK

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Targets

    • Target

      3444ac001a286b482e37b962667a66a4dea4488a53699445ace18af8ba062e90.exe

    • Size

      220KB

    • MD5

      7553b607fb939e371d7e165e2a5c45e0

    • SHA1

      a96097034705d598414055099b31cead78e342dd

    • SHA256

      3444ac001a286b482e37b962667a66a4dea4488a53699445ace18af8ba062e90

    • SHA512

      1520855d18b5716acb5af88e599cea594d8767ecb7851b905c9714fcd6891f3f5722ce31c99dd6e234e2fc87c04da76fec76f93577ede96b884b92963d3026d8

    • SSDEEP

      3072:M29DkEGRQixVSjLwes5G30Bg7uZwOuz/xS3iGpZMhDEXzkOSUUKeF8a7bXb:M29qRfVSndj30B3wBxE1+ijK

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula family

    • Sakula payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks