General
-
Target
cbffd8f471de9728610b1edd4519f65399a8e64e46177e1178685ef6b081065b
-
Size
132KB
-
Sample
220131-18a8cadcd8
-
MD5
8cc439ec874e83f11433d4c6ca244d6a
-
SHA1
1c325c12e0d63e03bab431da04b7f253c65eec3d
-
SHA256
cbffd8f471de9728610b1edd4519f65399a8e64e46177e1178685ef6b081065b
-
SHA512
06f527448714c4e6c5344446a4f5fe59d83fde200e59cb22a8ffeac3fa57f1fbddf383a0663f9d56a755f71102a54cf44a4143d8a2a4b13b7285dc9d76dc76c1
Static task
static1
Behavioral task
behavioral1
Sample
cbffd8f471de9728610b1edd4519f65399a8e64e46177e1178685ef6b081065b.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
cbffd8f471de9728610b1edd4519f65399a8e64e46177e1178685ef6b081065b.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
guloader
https://drive.google.com/uc?export=download&id=1EQ7DIlAk9lk2E52DQLELmB02ADqw-62s
Targets
-
-
Target
cbffd8f471de9728610b1edd4519f65399a8e64e46177e1178685ef6b081065b
-
Size
132KB
-
MD5
8cc439ec874e83f11433d4c6ca244d6a
-
SHA1
1c325c12e0d63e03bab431da04b7f253c65eec3d
-
SHA256
cbffd8f471de9728610b1edd4519f65399a8e64e46177e1178685ef6b081065b
-
SHA512
06f527448714c4e6c5344446a4f5fe59d83fde200e59cb22a8ffeac3fa57f1fbddf383a0663f9d56a755f71102a54cf44a4143d8a2a4b13b7285dc9d76dc76c1
Score10/10-
Guloader Payload
-
Sets service image path in registry
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-