General

  • Target

    1.exe

  • Size

    112KB

  • Sample

    220125-xjazhadcf4

  • MD5

    ae871d1957030344d4cefc7295a1e964

  • SHA1

    73e0d642d14ca3dcfca3d22fa2312968d1ba5cd6

  • SHA256

    6f8a836d10eada55bb1d3901ceb5b97711afc9f7018e3bd0f0a8e77521f18e5b

  • SHA512

    bc5a39f9a86bc6d461c32a947a61d7bbd0dd8ae93700bc9e3e984b33df6b9a0fac0e8dd71ca50e8dcfee9314bd00824fd4ec507c66e22e4bd20c1edf0dad4679

Score
10/10

Malware Config

Targets

    • Target

      1.exe

    • Size

      112KB

    • MD5

      ae871d1957030344d4cefc7295a1e964

    • SHA1

      73e0d642d14ca3dcfca3d22fa2312968d1ba5cd6

    • SHA256

      6f8a836d10eada55bb1d3901ceb5b97711afc9f7018e3bd0f0a8e77521f18e5b

    • SHA512

      bc5a39f9a86bc6d461c32a947a61d7bbd0dd8ae93700bc9e3e984b33df6b9a0fac0e8dd71ca50e8dcfee9314bd00824fd4ec507c66e22e4bd20c1edf0dad4679

    Score
    10/10
    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Checks QEMU agent file

      Checks presence of QEMU agent, possibly to detect virtualization.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks