General

  • Target

    bellerophon.exe

  • Size

    144KB

  • Sample

    221123-pbp5fsea71

  • MD5

    8a9c6996f2212dbc80925bb11d6fc1af

  • SHA1

    2c07af12be2988d32afb43067f2ee3c51700018e

  • SHA256

    59d5100a71f7b3106addf180c3943b907d924b92bb376deb9b426ed15e37979d

  • SHA512

    cfe902013fc325fbef73a9b56f4fa665c080e9ae5111f65daf849ac992d5061ba53e8b3ec75b44feeec34d0b26910fed88170159f77ab181273bb18eec5a1d67

  • SSDEEP

    3072:TaUOHpDt8VmEglSpYmQDczVtR9lPJtoVmy:TR0Dt8sI3zVtR9qsy

Malware Config

Extracted

Family

guloader

C2

https://drive.google.com/uc?export=download&id=1C7wid0ObWt92PjoJjUy2uO8KGpf3_dvC

xor.base64

Targets

    • Target

      bellerophon.exe

    • Size

      144KB

    • MD5

      8a9c6996f2212dbc80925bb11d6fc1af

    • SHA1

      2c07af12be2988d32afb43067f2ee3c51700018e

    • SHA256

      59d5100a71f7b3106addf180c3943b907d924b92bb376deb9b426ed15e37979d

    • SHA512

      cfe902013fc325fbef73a9b56f4fa665c080e9ae5111f65daf849ac992d5061ba53e8b3ec75b44feeec34d0b26910fed88170159f77ab181273bb18eec5a1d67

    • SSDEEP

      3072:TaUOHpDt8VmEglSpYmQDczVtR9lPJtoVmy:TR0Dt8sI3zVtR9qsy

MITRE ATT&CK Matrix

Tasks