General

  • Target

    e5d7545dfadb893067bf066e70f2dbe29e007b47befdf0743d71d07e1c262e91

  • Size

    241KB

  • Sample

    221209-rq95aadd36

  • MD5

    d7a778b1b1ea5c966fc63d1d5238e10c

  • SHA1

    d61399065129c621a8ac389736029fd404e06cb1

  • SHA256

    e5d7545dfadb893067bf066e70f2dbe29e007b47befdf0743d71d07e1c262e91

  • SHA512

    7c727dd658cac00b4dbf5a3f6f54f356748ff02523e88ad8836a599ce62af018f6a19f8067cab54dcf44b23ed98795957eb13dbf2ebae88d4797230bdfdddc10

  • SSDEEP

    3072:2fY/TU9fE9PEtuecPSQbuLO1DF/vTiYQb/20FwL44h8ond4WHEJyhUlFrEP9sb08:gYa6wkSQbXx/vTg/2ysnQpksb1D9CK

Malware Config

Targets

    • Target

      e5d7545dfadb893067bf066e70f2dbe29e007b47befdf0743d71d07e1c262e91

    • Size

      241KB

    • MD5

      d7a778b1b1ea5c966fc63d1d5238e10c

    • SHA1

      d61399065129c621a8ac389736029fd404e06cb1

    • SHA256

      e5d7545dfadb893067bf066e70f2dbe29e007b47befdf0743d71d07e1c262e91

    • SHA512

      7c727dd658cac00b4dbf5a3f6f54f356748ff02523e88ad8836a599ce62af018f6a19f8067cab54dcf44b23ed98795957eb13dbf2ebae88d4797230bdfdddc10

    • SSDEEP

      3072:2fY/TU9fE9PEtuecPSQbuLO1DF/vTiYQb/20FwL44h8ond4WHEJyhUlFrEP9sb08:gYa6wkSQbXx/vTg/2ysnQpksb1D9CK

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Checks QEMU agent file

      Checks presence of QEMU agent, possibly to detect virtualization.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks