General

  • Target

    03af1aee43643065ecccf579421c4460_NeikiAnalytics.exe

  • Size

    63KB

  • MD5

    03af1aee43643065ecccf579421c4460

  • SHA1

    9683902d7a3f74c85532854e5b48263f53b1737e

  • SHA256

    e23ab945ae9aab17c4a72babd5573cf3677401d8766d6ac593da7d18b514ea17

  • SHA512

    ae2018d8d5cc1cfd063ff6e285b7c3239bd362c27699a974082bd3abee838e3c62e69469310d5a71bfba67b16caaac0e8d28d8604418144d4f5a5dc1406cd2e7

  • SSDEEP

    1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkr3:0PPUj3+5FMIn8To94wa73

Score
10/10

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Signatures

  • Sakula family
  • Sakula payload 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 03af1aee43643065ecccf579421c4460_NeikiAnalytics.exe
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections