General
-
Target
0b8139e8d30cd4db7b1582d3a9ab2ed7004c9d9cfa76b8a201d2ad8d619f36f1N.exe
-
Size
220KB
-
Sample
250117-asktqswrdj
-
MD5
71fba82448bd00f78079d1dddca76b70
-
SHA1
6b3801205583554353f8c1aad4f42f9675ed1381
-
SHA256
0b8139e8d30cd4db7b1582d3a9ab2ed7004c9d9cfa76b8a201d2ad8d619f36f1
-
SHA512
8aa725a560d10ec465cbb76a343c00120185cff4829ffc0c76abb716e8f59c2ae7cebbfca0d25c3f69977f414ea6f8905e50fe6873e90577f695dd237d273f4e
-
SSDEEP
3072:M29DkEGRQixVSjLwes5G30Bg7uZwOuz/xS3iGpZMhDEXzkOSUUKeF8a7bXz:M29qRfVSndj30B3wBxE1+ij6
Behavioral task
behavioral1
Sample
0b8139e8d30cd4db7b1582d3a9ab2ed7004c9d9cfa76b8a201d2ad8d619f36f1N.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
0b8139e8d30cd4db7b1582d3a9ab2ed7004c9d9cfa76b8a201d2ad8d619f36f1N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
sakula
www.polarroute.com
Targets
-
-
Target
0b8139e8d30cd4db7b1582d3a9ab2ed7004c9d9cfa76b8a201d2ad8d619f36f1N.exe
-
Size
220KB
-
MD5
71fba82448bd00f78079d1dddca76b70
-
SHA1
6b3801205583554353f8c1aad4f42f9675ed1381
-
SHA256
0b8139e8d30cd4db7b1582d3a9ab2ed7004c9d9cfa76b8a201d2ad8d619f36f1
-
SHA512
8aa725a560d10ec465cbb76a343c00120185cff4829ffc0c76abb716e8f59c2ae7cebbfca0d25c3f69977f414ea6f8905e50fe6873e90577f695dd237d273f4e
-
SSDEEP
3072:M29DkEGRQixVSjLwes5G30Bg7uZwOuz/xS3iGpZMhDEXzkOSUUKeF8a7bXz:M29qRfVSndj30B3wBxE1+ij6
Score10/10-
Sakula family
-
Sakula payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1