General

  • Target

    07a43b94280f2f70215ed894792d939406572f13c4c2f93c9d3cdb315e4d7b72

  • Size

    443KB

  • MD5

    118564938b9837951a27c566eff70b0d

  • SHA1

    42ef2e5e97851632e33e9242fdaff1dc6812d9b7

  • SHA256

    07a43b94280f2f70215ed894792d939406572f13c4c2f93c9d3cdb315e4d7b72

  • SHA512

    6f080b89012fccdac1b3fb9ea13566fde56af76607aa2f5bd58684949dd74cf111379fb7323655c7ff100362168648d6cff42f698c4d5a84936ee09f8f04207c

  • SSDEEP

    6144:xdGNDwBxE1+ijiBKk3etdgI2MyzNORQtOfl1qNVo7R+S+N/TU7kn5119J3rR05u/:Mw8EYiBlMkn5f9J105ko8T6csVc

Score
10/10

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Signatures

  • Sakula family
  • Sakula payload 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 07a43b94280f2f70215ed894792d939406572f13c4c2f93c9d3cdb315e4d7b72
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections