General

  • Target

    c2c28d1ecbe86857c1cd0091103c15afe8f59982caa22acf1c63e63f98d27327

  • Size

    63KB

  • MD5

    67a2c5e6f58534483a2ab9b4c21e4f54

  • SHA1

    ab978fd68a046c0b887b933812b8699f479e9f62

  • SHA256

    c2c28d1ecbe86857c1cd0091103c15afe8f59982caa22acf1c63e63f98d27327

  • SHA512

    6c91aad259c78e3b7e6b94c27f19e84bd65c1523b410377b9dc65410cc6694d1e6dee5c0b7829120881b7ce7528f294879f69df6b8b896812e04f1b6584c381a

  • SSDEEP

    1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrt:0PPUj3+5FMIn8To94wa7t

Score
10/10

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Signatures

  • Sakula family
  • Sakula payload 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • c2c28d1ecbe86857c1cd0091103c15afe8f59982caa22acf1c63e63f98d27327
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections