General

  • Target

    2b082020e0054cd648a445040122e8f0_NeikiAnalytics.exe

  • Size

    317KB

  • MD5

    2b082020e0054cd648a445040122e8f0

  • SHA1

    c7b03531e5cf87331abccfce411276ffa72890d0

  • SHA256

    a4b8c21e6f8c4b5902cbb5bf96472425b08870c78acdfd76c99e43ec49151b09

  • SHA512

    05bca2ff52afd3f8cad1e03fe3fbf461787786a1598cac064ae24175b9d9f8a3519cce44b5d93234dbd25ec0e8e104dc70837f755e614c9129fc5deaf44a9653

  • SSDEEP

    6144:wBbGwBxE1+ijiBKk3etdgI2MyzNORQtOfl1qNVo7R+S+N/TU7U:wBbGw8EYiBlMU

Score
10/10

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Signatures

  • Sakula family
  • Sakula payload 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2b082020e0054cd648a445040122e8f0_NeikiAnalytics.exe
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections