General

  • Target

    6e54cfb012cdf9e14a596e970b01e7aab5ccbe039607fb90e8ea4022f3e3c3be

  • Size

    443KB

  • MD5

    38fa9e2a8e5b95680e4e813e6f331102

  • SHA1

    38a401ee44a9fa99064a7febc9137afd7e2b8c4a

  • SHA256

    6e54cfb012cdf9e14a596e970b01e7aab5ccbe039607fb90e8ea4022f3e3c3be

  • SHA512

    a16a895746fd83027c216fb8f796d8487a9e2d7b96db1cdffe38cad335c9dc36cd4dff71163565fec92b733061055cacf95ad363209c5d32b357de93d7f799a4

  • SSDEEP

    6144:xdGNDwBxE1+ijiBKk3etdgI2MyzNORQtOfl1qNVo7R+S+N/TU7kn5119J3rR05u7:Mw8EYiBlMkn5f9J105ko8T6csVc

Score
10/10

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Signatures

  • Sakula family
  • Sakula payload 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 6e54cfb012cdf9e14a596e970b01e7aab5ccbe039607fb90e8ea4022f3e3c3be
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections