General

  • Target

    Orden.xls

  • Size

    180KB

  • Sample

    210723-c13jbb7wf6

  • MD5

    6d40106f6254a4709fbc5ee82359a1b2

  • SHA1

    e1df7baf5d39a82ebb0fb0956d554ff4ea96a44a

  • SHA256

    2254889b715d357090efc3da8dfa5ed6407611605825038f9e1a9a3d949ae013

  • SHA512

    3b17c41a6f0769e43db9e2681975aa48421bf70b7c0a19177952a9c1de360b68d330df0e7222404d1af3f6defdd35f65ff7da5f94177f25bba9194c313059d14

Malware Config

Targets

    • Target

      Orden.xls

    • Size

      180KB

    • MD5

      6d40106f6254a4709fbc5ee82359a1b2

    • SHA1

      e1df7baf5d39a82ebb0fb0956d554ff4ea96a44a

    • SHA256

      2254889b715d357090efc3da8dfa5ed6407611605825038f9e1a9a3d949ae013

    • SHA512

      3b17c41a6f0769e43db9e2681975aa48421bf70b7c0a19177952a9c1de360b68d330df0e7222404d1af3f6defdd35f65ff7da5f94177f25bba9194c313059d14

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks