General
-
Target
1e22c8b70cc2513052775e1def2924fb68f7ade8ce05b80956e33b9f4d537887
-
Size
1.2MB
-
Sample
220707-ym5hyshghp
-
MD5
db70b79184e93cb4a00bafa49872001e
-
SHA1
433c3730edfe5be9e6c43a0d45117d8f9517a113
-
SHA256
1e22c8b70cc2513052775e1def2924fb68f7ade8ce05b80956e33b9f4d537887
-
SHA512
19294b8e47396b6576f7cf18e0d410e521538964a0338f1d1977d416fb30bf81530942798ce8f8395c77eaf46f287165538a4a4a583eeaa8e9a195f016a52f4f
Static task
static1
Behavioral task
behavioral1
Sample
EFT_PAY2.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
EFT_PAY2.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
EFT_PAYM.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
EFT_PAYM.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
guloader
http://misty-moji.watson.jp/.g/1.bin
http://misty-moji.watson.jp/.g/0.bin
Targets
-
-
Target
EFT_PAY2.EXE
-
Size
60KB
-
MD5
d610fd28f51bc21953c5f18e32916355
-
SHA1
431e567d76d2b8b6cee47ccc0a56767dc813a28f
-
SHA256
1219b705ed3603415200b7b5c568e5fa98ba8a129b9515852b669f3564815184
-
SHA512
58a00f0c0ddc870670b324050b88481b50f9183c1cf5ea215aea5a7e8a93f4ab481b78c74667839b89cfb559c56f541abd6db2d62d548377b29188eaa1796f0b
Score10/10-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
EFT_PAYM.EXE
-
Size
60KB
-
MD5
0bd3cafbcd17c9a2f1c5d0af75aa3af0
-
SHA1
4522cf6b8ccc191f78cafd1dbe732808eb6ff7b3
-
SHA256
4bc61662cd26311c0439c25b0ed232ec44061c1882110834f3353c7edbb2e420
-
SHA512
9abe5ee539678b28a9088d81290683d06bcfe1a5fe22fb2087cc534290e70e558f9485e2853ab8830e96b8b5e6848510360b0bd7a38d7563ecea2920e3e6439f
Score10/10-
Guloader payload
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-