General

  • Target

    9680b5d8d480bbabc54ca41336fc77801f6192f2e416c807265f10cbcfb6d72d

  • Size

    76KB

  • Sample

    220725-fpbpjsfhdl

  • MD5

    99ae4a0629e42551e9bca9f2ff9dfaa0

  • SHA1

    3c036f44b6aec26b7807f09ca3f2ca9ba168d401

  • SHA256

    9680b5d8d480bbabc54ca41336fc77801f6192f2e416c807265f10cbcfb6d72d

  • SHA512

    39fc5b76e9af1652fada14ebb300e5b1d5eb8aace888fc67f71afc5595b05a407f0f71830ce554fcb583df000a0f97bb0d9bb92e781519f97ff4c79d12d0c740

Malware Config

Targets

    • Target

      9680b5d8d480bbabc54ca41336fc77801f6192f2e416c807265f10cbcfb6d72d

    • Size

      76KB

    • MD5

      99ae4a0629e42551e9bca9f2ff9dfaa0

    • SHA1

      3c036f44b6aec26b7807f09ca3f2ca9ba168d401

    • SHA256

      9680b5d8d480bbabc54ca41336fc77801f6192f2e416c807265f10cbcfb6d72d

    • SHA512

      39fc5b76e9af1652fada14ebb300e5b1d5eb8aace888fc67f71afc5595b05a407f0f71830ce554fcb583df000a0f97bb0d9bb92e781519f97ff4c79d12d0c740

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Guloader payload

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks