General

  • Target

    SecuriteInfo.com.Trojan.GenericKD.62655029.2208.13021.exe

  • Size

    536KB

  • Sample

    221010-pbfwsabga2

  • MD5

    0d7c11c2202fff468c4e9f8ed29b682d

  • SHA1

    cd9e6dd5e7c55e9bebf9f184c6826f7548185006

  • SHA256

    5736beeb3bcccf928f1520272f417f37c19758762b14819485c8a1bf6220b817

  • SHA512

    0c6098cd61473090ecc8ec0f8f628149b93febdff7f2e0d553504c2703c420546ffd6abf6c02403a9088856d9e8cac6701ca52c09c94b79629f85b411f6c9e86

  • SSDEEP

    6144:5B+pgUzkmJo/iXl2PfBanor7zs1fP/mz2Po9Row9AckGsePWy:5gLaiXBn87QRmio9CweGsdy

Malware Config

Targets

    • Target

      SecuriteInfo.com.Trojan.GenericKD.62655029.2208.13021.exe

    • Size

      536KB

    • MD5

      0d7c11c2202fff468c4e9f8ed29b682d

    • SHA1

      cd9e6dd5e7c55e9bebf9f184c6826f7548185006

    • SHA256

      5736beeb3bcccf928f1520272f417f37c19758762b14819485c8a1bf6220b817

    • SHA512

      0c6098cd61473090ecc8ec0f8f628149b93febdff7f2e0d553504c2703c420546ffd6abf6c02403a9088856d9e8cac6701ca52c09c94b79629f85b411f6c9e86

    • SSDEEP

      6144:5B+pgUzkmJo/iXl2PfBanor7zs1fP/mz2Po9Row9AckGsePWy:5gLaiXBn87QRmio9CweGsdy

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Checks QEMU agent file

      Checks presence of QEMU agent, possibly to detect virtualization.

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks