General

  • Target

    cfd2f38d9e2c3e90ca1a7ac9d0b0eed5fdc56eaf8322fa6298a3376409969c08

  • Size

    104KB

  • Sample

    220724-rtpyhsfgal

  • MD5

    622a36b956cd48d3115dd61a15838c01

  • SHA1

    33c815f58508bfcb165bfdf04ce1cb037bc32608

  • SHA256

    cfd2f38d9e2c3e90ca1a7ac9d0b0eed5fdc56eaf8322fa6298a3376409969c08

  • SHA512

    e85aa95b4636e852ffdfe9dcb01fdd69e4906b3a06453fa80217c560679da226edb8c87c7947d7a9ebc5428b73fc1757d0b2fcafa806794e4dca026a9602d6d5

Malware Config

Extracted

Family

guloader

C2

https://drive.google.com/uc?export=download&id=1idPHLJ12aUPBxrHAWLPhsoylYnBkX85o

xor.base64

Targets

    • Target

      cfd2f38d9e2c3e90ca1a7ac9d0b0eed5fdc56eaf8322fa6298a3376409969c08

    • Size

      104KB

    • MD5

      622a36b956cd48d3115dd61a15838c01

    • SHA1

      33c815f58508bfcb165bfdf04ce1cb037bc32608

    • SHA256

      cfd2f38d9e2c3e90ca1a7ac9d0b0eed5fdc56eaf8322fa6298a3376409969c08

    • SHA512

      e85aa95b4636e852ffdfe9dcb01fdd69e4906b3a06453fa80217c560679da226edb8c87c7947d7a9ebc5428b73fc1757d0b2fcafa806794e4dca026a9602d6d5

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Guloader payload

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks