General

  • Target

    28106556ae6c11dd40bcdbc70a846eeb898637559c1b5e41447d1d80c266eece.exe

  • Size

    139KB

  • Sample

    220514-q5papacdfr

  • MD5

    9b0d831c2f8640ba99b167a8198cc6a8

  • SHA1

    0dbd78d7572a27d49bba5e458fd314c7e2405d48

  • SHA256

    28106556ae6c11dd40bcdbc70a846eeb898637559c1b5e41447d1d80c266eece

  • SHA512

    266a31d3af5ec80ed528a7e584c46ab6f013c148203da75bdeee0bd2fa7242152614700049f090f830774c7bcf54dc5738b4ec0657c879f9a9f6ab7244f84bd5

Score
10/10

Malware Config

Targets

    • Target

      28106556ae6c11dd40bcdbc70a846eeb898637559c1b5e41447d1d80c266eece.exe

    • Size

      139KB

    • MD5

      9b0d831c2f8640ba99b167a8198cc6a8

    • SHA1

      0dbd78d7572a27d49bba5e458fd314c7e2405d48

    • SHA256

      28106556ae6c11dd40bcdbc70a846eeb898637559c1b5e41447d1d80c266eece

    • SHA512

      266a31d3af5ec80ed528a7e584c46ab6f013c148203da75bdeee0bd2fa7242152614700049f090f830774c7bcf54dc5738b4ec0657c879f9a9f6ab7244f84bd5

    Score
    10/10
    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Checks QEMU agent file

      Checks presence of QEMU agent, possibly to detect virtualization.

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks