General

  • Target

    cf6c25fac3c90da84500f7d672686b13a0af90322ef7e7d6a3565d782a22596c

  • Size

    411KB

  • MD5

    855771f2064ccb4d77b0fcf993080fb4

  • SHA1

    fd2bebced8a5157dcae9598c59317d6ea72fcb45

  • SHA256

    cf6c25fac3c90da84500f7d672686b13a0af90322ef7e7d6a3565d782a22596c

  • SHA512

    c6ea7cd01ca22fc64d3d68ada04d449df474ac21bcb9164f04aaeadb0559398b17e9555174129f894f40b06f6e0d9af72aac524c5a1316fa6d69f902ec2faf26

  • SSDEEP

    6144:LHkZeUwBxE1+ijiBKk3etdgI2MyzNORQtOfl1qNVo7R+S+N/TU7kn5119J3rR05d:zkZbw8EYiBlMkn5f9J105ko8W

Score
10/10

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Signatures

  • Sakula family
  • Sakula payload 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • cf6c25fac3c90da84500f7d672686b13a0af90322ef7e7d6a3565d782a22596c
    .exe windows:5 windows x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86


    Headers

    Sections