General
-
Target
935f36c0a213f780fec1e5a463e72246843b68583fddc80940bf512c425e69ae
-
Size
60KB
-
Sample
220724-vjrk5sbff9
-
MD5
d54c3346dcbbed15084c96b9c569dc0e
-
SHA1
f58bab915d9d33a26676750c2ae24e2ea69050d0
-
SHA256
935f36c0a213f780fec1e5a463e72246843b68583fddc80940bf512c425e69ae
-
SHA512
2cf3588e64ec82cf06b5a2f4e3a79a9af2637da9aec2445436cc25a7cc86cae53edf622453433471e651862dc3b80dc88a0031932b854bf5a182b23fa68b5ba0
Static task
static1
Behavioral task
behavioral1
Sample
935f36c0a213f780fec1e5a463e72246843b68583fddc80940bf512c425e69ae.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
935f36c0a213f780fec1e5a463e72246843b68583fddc80940bf512c425e69ae.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
guloader
https://drive.google.com/uc?export=download&id=1N6W2WLdOxmRRSOjeu1oRU1aKDJOur2pv
Targets
-
-
Target
935f36c0a213f780fec1e5a463e72246843b68583fddc80940bf512c425e69ae
-
Size
60KB
-
MD5
d54c3346dcbbed15084c96b9c569dc0e
-
SHA1
f58bab915d9d33a26676750c2ae24e2ea69050d0
-
SHA256
935f36c0a213f780fec1e5a463e72246843b68583fddc80940bf512c425e69ae
-
SHA512
2cf3588e64ec82cf06b5a2f4e3a79a9af2637da9aec2445436cc25a7cc86cae53edf622453433471e651862dc3b80dc88a0031932b854bf5a182b23fa68b5ba0
Score10/10-
Guloader payload
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-