General

  • Target

    fc22b02b9aa02f9225d165c9d1bfe06c8d7a45124af01231a8da0ede13985188

  • Size

    367KB

  • Sample

    230717-khsfyabe9s

  • MD5

    05046061d3b57c33f7abc251f1cd289f

  • SHA1

    d386f71733ee92746b1bf91c5217273e76425d07

  • SHA256

    fc22b02b9aa02f9225d165c9d1bfe06c8d7a45124af01231a8da0ede13985188

  • SHA512

    670ababbf3784d47a286ca59a27111846d2d37014e6cb236ee311ebabb0f9765617622c8ceba192cad94662ff230b873c9b7422629adb2b33628fe3a4dbd7b35

  • SSDEEP

    6144:RoShfEPZVheNA+ff03UkBjLylpzCjp0mutA1EwMf6rbb/M:+qCnhe2e4UjvzCjpfuoQfe

Malware Config

Targets

    • Target

      justificantePago_es_180214093508pdf.exe

    • Size

      365KB

    • MD5

      1d5be1ffdf8027ae4ba56a558de77873

    • SHA1

      e51617c6c22b2d8d2006a84799407bbae2c9ca6a

    • SHA256

      d281affc2736ac156994801cf3f0cc51eb7ab802bd49f0e4651f0762458fd3cb

    • SHA512

      101b9ac44b8f779a5f379eff2b9b826da5671a018545d2b5da41f440f13993d99aed33c3127f9792a5b78dea30118c7f5a6018ac8e51346e6c1790bdfc1d8e41

    • SSDEEP

      6144:/oShfEPZVheNA+ff03UkBjLylpzCjp0mutA1EwMf6rbb/M5:QqCnhe2e4UjvzCjpfuoQfey

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Checks QEMU agent file

      Checks presence of QEMU agent, possibly to detect virtualization.

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks