Details
FileName | |
---|---|
Malware Family | Sakula |
Date Added | 2016-04-24 06:49:23 |
MD5 | c543c895c97b0d03026e620d7a3595d3 |
Sha256 | 4677b0d5a1a3958848a6d5a3250e4346ea1d92b3784d5b6cc7905b2506af9163 |
Robot | Robots lovingly delivered by robohash.org |
Advertising
Config Data
2_URI GET3 Arg | imageid |
---|---|
2_URI GET2 File | /viewphoto.asp |
2_AutoRun Key | MicroMedia |
1_AutoRun Key | MicroMedia |
2_URI GET1 Folder | /photo/ |
1_URI GET3 Arg | imageid |
1_Domain | www.polarroute.com |
1_URI GET3 File | newimage.asp |
2_Copy File Path | %Temp%\MicroMedia |
2_Domain | www.northpoleroute.com |
2_Campaign ID | honeywell |
1_Copy File Name | MediaCenter.exe |
1_URI GET1 Folder | /photo/ |
1_URI GET2 File | /viewphoto.asp |
2_Copy File Name | MediaCenter.exe |
1_Copy File Path | %Temp%\MicroMedia |
1_Campaign ID | honeywell |
2_Waiting Time | 30000 |
1_Waiting Time | 30000 |
2_URI GET3 File | newimage.asp |
Virustotal
0 out of 0 AV Engines identified the sample as Malicious.