General

  • Target

    6cfc448eb004701b9c323726916578e7407eec863ee5be8d4a31afc6c8e85c79_NeikiAnalytics.exe

  • Size

    63KB

  • MD5

    5c1ea9e69625ee8e2672e4993f4ddcf0

  • SHA1

    13a831e1dd781eb500be3b308fbab2f79f9cb258

  • SHA256

    6cfc448eb004701b9c323726916578e7407eec863ee5be8d4a31afc6c8e85c79

  • SHA512

    a78046aaf370ecc0db825afc587be2920bdd7e9c3bf287666edc97bdf3941f5f33ea57ffb689187aedc063cbc1e0e897cafa14e58cf21e3e6c1047b941c097fe

  • SSDEEP

    1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrY:0PPUj3+5FMIn8To94wa7Y

Score
10/10

Malware Config

Extracted

Family

sakula

C2

www.polarroute.com

Signatures

  • Sakula family
  • Sakula payload 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 6cfc448eb004701b9c323726916578e7407eec863ee5be8d4a31afc6c8e85c79_NeikiAnalytics.exe
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections