General

  • Target

    SARS_REFUND_STATUS.pdf.lnk

  • Size

    2KB

  • Sample

    230126-3q514sfh24

  • MD5

    cede936f03c958032135eaaee5644b8d

  • SHA1

    e74704f4879a40d109b7d9113a4211fc62fa0daf

  • SHA256

    4c4233e5b018a60d44067d4c5f40e18a06b544b35bbe2be95587b80bf2bf31f4

  • SHA512

    9c6a094e0ccfc8aa903423bf6578327b3aacdb9c6f1a1ff5a6332656caf982cd717defe6449a0360297865af1b92d37f7c1040fdd63248d81632eaa217acec95

Malware Config

Targets

    • Target

      SARS_REFUND_STATUS.pdf.lnk

    • Size

      2KB

    • MD5

      cede936f03c958032135eaaee5644b8d

    • SHA1

      e74704f4879a40d109b7d9113a4211fc62fa0daf

    • SHA256

      4c4233e5b018a60d44067d4c5f40e18a06b544b35bbe2be95587b80bf2bf31f4

    • SHA512

      9c6a094e0ccfc8aa903423bf6578327b3aacdb9c6f1a1ff5a6332656caf982cd717defe6449a0360297865af1b92d37f7c1040fdd63248d81632eaa217acec95

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Blocklisted process makes network request

    • Checks QEMU agent file

      Checks presence of QEMU agent, possibly to detect virtualization.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks