General

  • Target

    a75c770acab8755ebc617f8925eff3b4.bin

  • Size

    34KB

  • Sample

    230412-d9g1ysbb2v

  • MD5

    a75c770acab8755ebc617f8925eff3b4

  • SHA1

    3368ba6a1379d325bd9f0ccfe207f4963217b9c9

  • SHA256

    926fe7f70c86b5c16a632344191820206772f8c53ac075446b138d209a1bf22a

  • SHA512

    2f98c7848fcb81dc39772bc3129be29c3f22ebce2cca03da3150e9f75e2f9fd472ef4301782f91c23f65a9d6f93957e653862f723b5f99293f609430caa715a6

  • SSDEEP

    768:UObC4BcJLusxj/gqJ77UkZb3d8IbXK4HkMsFkafl:J24B2usBveebNzb6kul

Malware Config

Targets

    • Target

      a75c770acab8755ebc617f8925eff3b4.bin

    • Size

      34KB

    • MD5

      a75c770acab8755ebc617f8925eff3b4

    • SHA1

      3368ba6a1379d325bd9f0ccfe207f4963217b9c9

    • SHA256

      926fe7f70c86b5c16a632344191820206772f8c53ac075446b138d209a1bf22a

    • SHA512

      2f98c7848fcb81dc39772bc3129be29c3f22ebce2cca03da3150e9f75e2f9fd472ef4301782f91c23f65a9d6f93957e653862f723b5f99293f609430caa715a6

    • SSDEEP

      768:UObC4BcJLusxj/gqJ77UkZb3d8IbXK4HkMsFkafl:J24B2usBveebNzb6kul

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Blocklisted process makes network request

    • Checks QEMU agent file

      Checks presence of QEMU agent, possibly to detect virtualization.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks