General

  • Target

    935f36c0a213f780fec1e5a463e72246843b68583fddc80940bf512c425e69ae

  • Size

    60KB

  • Sample

    220724-vjrk5sbff9

  • MD5

    d54c3346dcbbed15084c96b9c569dc0e

  • SHA1

    f58bab915d9d33a26676750c2ae24e2ea69050d0

  • SHA256

    935f36c0a213f780fec1e5a463e72246843b68583fddc80940bf512c425e69ae

  • SHA512

    2cf3588e64ec82cf06b5a2f4e3a79a9af2637da9aec2445436cc25a7cc86cae53edf622453433471e651862dc3b80dc88a0031932b854bf5a182b23fa68b5ba0

Malware Config

Extracted

Family

guloader

C2

https://drive.google.com/uc?export=download&id=1N6W2WLdOxmRRSOjeu1oRU1aKDJOur2pv

xor.base64

Targets

    • Target

      935f36c0a213f780fec1e5a463e72246843b68583fddc80940bf512c425e69ae

    • Size

      60KB

    • MD5

      d54c3346dcbbed15084c96b9c569dc0e

    • SHA1

      f58bab915d9d33a26676750c2ae24e2ea69050d0

    • SHA256

      935f36c0a213f780fec1e5a463e72246843b68583fddc80940bf512c425e69ae

    • SHA512

      2cf3588e64ec82cf06b5a2f4e3a79a9af2637da9aec2445436cc25a7cc86cae53edf622453433471e651862dc3b80dc88a0031932b854bf5a182b23fa68b5ba0

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Guloader payload

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks