General

  • Target

    95fdc135df36b6bf530e212aa9d2b17ed5e9fb68346207def665bbac3dae60c1

  • Size

    124KB

  • Sample

    220731-f8lc4acaep

  • MD5

    d5c8980d4a707e0a2772e57e4e33662f

  • SHA1

    9434bfb43e047c8f523a1a9c1b3a1e39574068ec

  • SHA256

    95fdc135df36b6bf530e212aa9d2b17ed5e9fb68346207def665bbac3dae60c1

  • SHA512

    c76604e13ad6321bb6a5d81d091dd4ba2b2387b2cfec54b4ed3e8c8fde52ebc93faf7a2819aa96152837870a4a652ce725eb39d7ed882a706ee88a4dbc629796

Malware Config

Extracted

Family

guloader

C2

https://drive.google.com/uc?export=download&id=1q-1xTD9weiWyiJIbO51ubhF470YCiWrW

xor.base64

Targets

    • Target

      95fdc135df36b6bf530e212aa9d2b17ed5e9fb68346207def665bbac3dae60c1

    • Size

      124KB

    • MD5

      d5c8980d4a707e0a2772e57e4e33662f

    • SHA1

      9434bfb43e047c8f523a1a9c1b3a1e39574068ec

    • SHA256

      95fdc135df36b6bf530e212aa9d2b17ed5e9fb68346207def665bbac3dae60c1

    • SHA512

      c76604e13ad6321bb6a5d81d091dd4ba2b2387b2cfec54b4ed3e8c8fde52ebc93faf7a2819aa96152837870a4a652ce725eb39d7ed882a706ee88a4dbc629796

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Guloader payload

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks