General
-
Target
5f2a6c6630b0cbd63dea1f70b3973bca50cae187b79ec542c9e7c85f558d2f56
-
Size
120KB
-
Sample
220724-rtmhdsfeg4
-
MD5
68d86587fb4624c57b3874c5d06a82c0
-
SHA1
ab9f6e444276c07a2a1106513c0c16c298c0e67d
-
SHA256
5f2a6c6630b0cbd63dea1f70b3973bca50cae187b79ec542c9e7c85f558d2f56
-
SHA512
f0be2217b85d405d26c0357375ee650c90d5d7e0fe2b55a04fbbb8b5561f2174d181e01206eef1bbbd9920952aef9868362a80ca6011065a61b1dada3c90db5b
Static task
static1
Behavioral task
behavioral1
Sample
5f2a6c6630b0cbd63dea1f70b3973bca50cae187b79ec542c9e7c85f558d2f56.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
5f2a6c6630b0cbd63dea1f70b3973bca50cae187b79ec542c9e7c85f558d2f56.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
guloader
Targets
-
-
Target
5f2a6c6630b0cbd63dea1f70b3973bca50cae187b79ec542c9e7c85f558d2f56
-
Size
120KB
-
MD5
68d86587fb4624c57b3874c5d06a82c0
-
SHA1
ab9f6e444276c07a2a1106513c0c16c298c0e67d
-
SHA256
5f2a6c6630b0cbd63dea1f70b3973bca50cae187b79ec542c9e7c85f558d2f56
-
SHA512
f0be2217b85d405d26c0357375ee650c90d5d7e0fe2b55a04fbbb8b5561f2174d181e01206eef1bbbd9920952aef9868362a80ca6011065a61b1dada3c90db5b
Score10/10-
Guloader payload
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-