General

  • Target

    e6ea5bf105cb9cc0179936556789bed4da1d7b4a99cf5f9d3b5f0e98f007f54e

  • Size

    104KB

  • Sample

    220725-e91nqsfac5

  • MD5

    eb809d0c1d289ba0c05f38dee87e9438

  • SHA1

    697d57f9cdc1d4972bb38fb7a66245f18fb31358

  • SHA256

    e6ea5bf105cb9cc0179936556789bed4da1d7b4a99cf5f9d3b5f0e98f007f54e

  • SHA512

    387cece6856a8dd49d80216b4adedaf32caf8177274d8514ca5ee1eceddbd9d6e54db1497f9cc721adc6e2c583131f3d48933905b68adef0125ffe193105c88b

Malware Config

Extracted

Family

guloader

C2

https://drive.google.com/uc?export=download&id=1u1K-6iLO23c0qqxnN_wM0HpckMBOMwN6

xor.base64

Targets

    • Target

      e6ea5bf105cb9cc0179936556789bed4da1d7b4a99cf5f9d3b5f0e98f007f54e

    • Size

      104KB

    • MD5

      eb809d0c1d289ba0c05f38dee87e9438

    • SHA1

      697d57f9cdc1d4972bb38fb7a66245f18fb31358

    • SHA256

      e6ea5bf105cb9cc0179936556789bed4da1d7b4a99cf5f9d3b5f0e98f007f54e

    • SHA512

      387cece6856a8dd49d80216b4adedaf32caf8177274d8514ca5ee1eceddbd9d6e54db1497f9cc721adc6e2c583131f3d48933905b68adef0125ffe193105c88b

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Guloader payload

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks