General

  • Target

    LIST OF ITEMS 2021 project.xlsx

  • Size

    590KB

  • Sample

    210915-gs66asdacm

  • MD5

    4a1d13469a6c817242e8b567bf34ab9a

  • SHA1

    a0d54f6c1205defad5f31cadf3393880e7c4c862

  • SHA256

    65514d1bcd58f206fbc6339c7893a4dc5fb3e7de39177038eac73906ec5c622c

  • SHA512

    a89649b90fe5900f3a014d84cee247df5ee514066bc2b58b968eea203d5290db6964aa5e6f5169cd4830121b0044c620c55db1089bb6c73c1af18f7a82729bf8

Malware Config

Targets

    • Target

      LIST OF ITEMS 2021 project.xlsx

    • Size

      590KB

    • MD5

      4a1d13469a6c817242e8b567bf34ab9a

    • SHA1

      a0d54f6c1205defad5f31cadf3393880e7c4c862

    • SHA256

      65514d1bcd58f206fbc6339c7893a4dc5fb3e7de39177038eac73906ec5c622c

    • SHA512

      a89649b90fe5900f3a014d84cee247df5ee514066bc2b58b968eea203d5290db6964aa5e6f5169cd4830121b0044c620c55db1089bb6c73c1af18f7a82729bf8

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

      suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks QEMU agent file

      Checks presence of QEMU agent, possibly to detect virtualization.

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Tasks