Analysis
-
max time kernel
64s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-01-2023 15:21
Static task
static1
Behavioral task
behavioral1
Sample
575e19ad416bf6a90324a40672263c1a4b13c4c3adc9c40fe6c935943d1bfed6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
575e19ad416bf6a90324a40672263c1a4b13c4c3adc9c40fe6c935943d1bfed6.exe
Resource
win10v2004-20220812-en
General
-
Target
575e19ad416bf6a90324a40672263c1a4b13c4c3adc9c40fe6c935943d1bfed6.exe
-
Size
72KB
-
MD5
b91b610416a4c6dd5d35761c73b72d7b
-
SHA1
30427a2889fb6e53279bfadab24d4cf9320f283e
-
SHA256
575e19ad416bf6a90324a40672263c1a4b13c4c3adc9c40fe6c935943d1bfed6
-
SHA512
cb695947768ed7cc38c36c8762f2f1eb4f70a4bfa56032033a64afe22a0dff98bfbda29767f2cb4b6936be2305d154f96379a4f80663f0873b01d2067204f4f0
-
SSDEEP
1536:rXBAgCHlLmY9rZaKJ0OYaYnjQ8pXkpK3bqDX:r8aY9rZ/xHYjQ4X4K2D
Malware Config
Extracted
guloader
https://drive.google.com/uc?export=download&id=1JOvVsVpUZb8mWC2hAze-6oEaEatA8yg2
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Guloader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1480-56-0x00000000003F0000-0x00000000003FB000-memory.dmp family_guloader -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
575e19ad416bf6a90324a40672263c1a4b13c4c3adc9c40fe6c935943d1bfed6.exepid process 1480 575e19ad416bf6a90324a40672263c1a4b13c4c3adc9c40fe6c935943d1bfed6.exe