General

  • Target

    793f2f8dfed964a286fe7b96db07914872459c90baf13ff2c7b0bbeefa75abee

  • Size

    84KB

  • Sample

    230129-t8vtesea85

  • MD5

    70ed29c8a7ade32fabff34b24fa991b3

  • SHA1

    4ef2f2e199afe62184aeb472e3727655167c6104

  • SHA256

    793f2f8dfed964a286fe7b96db07914872459c90baf13ff2c7b0bbeefa75abee

  • SHA512

    e2a0293af980c4b96cf061dfd6f90aa780f315109750657f6abe1b5a96f4b41875f1d8472ad082315461719257fc6fc6bf8bf9ab0048489e8ec9da734b9af50e

  • SSDEEP

    768:Pw5XDW3Cf0jYEfGEYeqsW/y1cawgSNnPFfHr8jNEK4cRXuPHC5qLS7OGvy2yYJkT:45q3IeGv/oSBdL8jPsHsK+1OShJM

Malware Config

Extracted

Family

guloader

C2

https://drive.google.com/uc?export=download&id=1nnl01kb-i9suGiNkUXB-JA4XCUUKt-1j

xor.base64

Targets

    • Target

      793f2f8dfed964a286fe7b96db07914872459c90baf13ff2c7b0bbeefa75abee

    • Size

      84KB

    • MD5

      70ed29c8a7ade32fabff34b24fa991b3

    • SHA1

      4ef2f2e199afe62184aeb472e3727655167c6104

    • SHA256

      793f2f8dfed964a286fe7b96db07914872459c90baf13ff2c7b0bbeefa75abee

    • SHA512

      e2a0293af980c4b96cf061dfd6f90aa780f315109750657f6abe1b5a96f4b41875f1d8472ad082315461719257fc6fc6bf8bf9ab0048489e8ec9da734b9af50e

    • SSDEEP

      768:Pw5XDW3Cf0jYEfGEYeqsW/y1cawgSNnPFfHr8jNEK4cRXuPHC5qLS7OGvy2yYJkT:45q3IeGv/oSBdL8jPsHsK+1OShJM

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Guloader payload

    • Checks QEMU agent file

      Checks presence of QEMU agent, possibly to detect virtualization.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks