Details
Malware Family Sakula
Date Added March 10, 2016, 3 a.m.
MD5 5e0e71beeedc09ca59f5b8ea90b37f07
Sha256 11ba39b93ac96bfd9687658313bed7dbc682e04eb47b2f14664d8442270b11c9
Robot Robots lovingly delivered by robohash.org
Config Sections
2_Copy File Name MediaCenter.exe
2_URI GET2 File /viewphoto.asp
1_Copy File Name MediaCenter.exe
1_Waiting Time 30000
1_URI GET3 File newimage.asp
2_URI GET1 Folder /photo/
1_URI GET1 Folder /photo/
2_Campaign ID honeywell
2_Domain www.northpoleroute.com
2_URI GET3 Arg imageid
2_Copy File Path %Temp%\MicroMedia
1_Copy File Path %Temp%\MicroMedia
1_AutoRun Key MicroMedia
2_URI GET3 File newimage.asp
2_AutoRun Key MicroMedia
2_Waiting Time 30000
1_Domain www.polarroute.com
1_URI GET2 File /viewphoto.asp
1_URI GET3 Arg imageid
1_Campaign ID honeywell
Advertising
VirusTotal

44 out of 56 AV's Identified the sample as Malicious

Virus Total Report

Domain Data
Domain IP Country Code
www.polarroute.com polarroute.com 0
www.northpoleroute.com northpoleroute. 0
Geo Location
Yara Rules
Comments
comments powered by Disqus