General

  • Target

    08e0f103c6b79b253f9495082c2cd9e0_NeikiAnalytics

  • Size

    63KB

  • MD5

    08e0f103c6b79b253f9495082c2cd9e0

  • SHA1

    af09138e6fbd5adca56c7483679dde5b191aa221

  • SHA256

    6c57bff2085acd400560af23a685ef13fb155adc7d658354fd709b059a0d8d19

  • SHA512

    b91834691a938bb36c2a5831441ddc9eac2df84d415c6638a54aa5bc426f061c9f810756676fe921d66c03a2d8c90b1ae6ef0988835d9fb4e2e445d82e7d58be

  • SSDEEP

    1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrw:0PPUj3+5FMIn8To94wa7w

Score
10/10

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Signatures

  • Sakula family
  • Sakula payload 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 08e0f103c6b79b253f9495082c2cd9e0_NeikiAnalytics
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections