General

  • Target

    1632-2-0x0000000000400000-0x000000000040B000-memory.dmp

  • Size

    44KB

  • MD5

    57e737527dadb8f43ef0856c21080f8c

  • SHA1

    4b1b7cb83ae0d34b46e20629dd735ed79ddd2a0c

  • SHA256

    a53a282dfa2097c14cf9f67251ad27148f4afcd4c5745909dec1b80d9cb86119

  • SHA512

    5e0deb20a7de065f056b6d7cc366b18d1aa3dbabd5c8da99eef7943afe6579a29cd72379894ec4d8c4e34c795a08249c3af82b84345228e295ffdf6a21b4a529

  • SSDEEP

    384:xhnyaz2ypQY5ZkV6BjqvhyY3Q6oVxYshTCY3WqPakgUt11iyBrUo7MgImBH+Tp:GnHY5ZkAF4hyYtoVxYshem1oUt1vnhBa

Score
10/10

Malware Config

Extracted

Family

sakula

C2

http://vpn.premrera.com:443/viewpre.asp?cstring=%s&tom=%d&id=%d

http://vpn.premrera.com:443/photo/%s.jpg?id=%d

http://173.254.226.212:443/viewpre.asp?cstring=%s&tom=%d&id=%d

http://173.254.226.212:443/photo/%s.jpg?id=%d

Signatures

  • Sakula family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1632-2-0x0000000000400000-0x000000000040B000-memory.dmp
    .exe windows:4 windows x86

    bac78d68d76cec273167912251c74570


    Headers

    Imports

    Sections