General

  • Target

    1e22c8b70cc2513052775e1def2924fb68f7ade8ce05b80956e33b9f4d537887

  • Size

    1.2MB

  • Sample

    220707-ym5hyshghp

  • MD5

    db70b79184e93cb4a00bafa49872001e

  • SHA1

    433c3730edfe5be9e6c43a0d45117d8f9517a113

  • SHA256

    1e22c8b70cc2513052775e1def2924fb68f7ade8ce05b80956e33b9f4d537887

  • SHA512

    19294b8e47396b6576f7cf18e0d410e521538964a0338f1d1977d416fb30bf81530942798ce8f8395c77eaf46f287165538a4a4a583eeaa8e9a195f016a52f4f

Malware Config

Extracted

Family

guloader

C2

http://misty-moji.watson.jp/.g/1.bin

http://misty-moji.watson.jp/.g/0.bin

xor.base64
xor.base64

Targets

    • Target

      EFT_PAY2.EXE

    • Size

      60KB

    • MD5

      d610fd28f51bc21953c5f18e32916355

    • SHA1

      431e567d76d2b8b6cee47ccc0a56767dc813a28f

    • SHA256

      1219b705ed3603415200b7b5c568e5fa98ba8a129b9515852b669f3564815184

    • SHA512

      58a00f0c0ddc870670b324050b88481b50f9183c1cf5ea215aea5a7e8a93f4ab481b78c74667839b89cfb559c56f541abd6db2d62d548377b29188eaa1796f0b

    Score
    10/10
    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      EFT_PAYM.EXE

    • Size

      60KB

    • MD5

      0bd3cafbcd17c9a2f1c5d0af75aa3af0

    • SHA1

      4522cf6b8ccc191f78cafd1dbe732808eb6ff7b3

    • SHA256

      4bc61662cd26311c0439c25b0ed232ec44061c1882110834f3353c7edbb2e420

    • SHA512

      9abe5ee539678b28a9088d81290683d06bcfe1a5fe22fb2087cc534290e70e558f9485e2853ab8830e96b8b5e6848510360b0bd7a38d7563ecea2920e3e6439f

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Guloader payload

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks