Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
16-04-2021 06:38
Static task
static1
Behavioral task
behavioral1
Sample
bellerophon.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
bellerophon.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
bellerophon.exe
-
Size
144KB
-
MD5
8a9c6996f2212dbc80925bb11d6fc1af
-
SHA1
2c07af12be2988d32afb43067f2ee3c51700018e
-
SHA256
59d5100a71f7b3106addf180c3943b907d924b92bb376deb9b426ed15e37979d
-
SHA512
cfe902013fc325fbef73a9b56f4fa665c080e9ae5111f65daf849ac992d5061ba53e8b3ec75b44feeec34d0b26910fed88170159f77ab181273bb18eec5a1d67
Score
10/10
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Guloader Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1076-61-0x00000000002F0000-0x00000000002FC000-memory.dmp family_guloader -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
bellerophon.exepid process 1076 bellerophon.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1076-61-0x00000000002F0000-0x00000000002FC000-memory.dmpFilesize
48KB