General

  • Target

    Dekont.exe

  • Size

    272KB

  • Sample

    230803-h3ttdsbh72

  • MD5

    aa48863662165dbb591ffaf354a24004

  • SHA1

    6c38c89eb2db8f8cf810d492295ab9105d6b56d1

  • SHA256

    e15efe6abb3771d3bc76e8df6a9208035a5f741c5e8ea4381b48a1cf61d23e7d

  • SHA512

    7d8ac8ff546d2e409d048594c4b4f517426a8f743d11a946634cf85ece3f60e0d5c8b5496b7ff22a61ed424884e63c1f1907a5d869012b1052fc5c01e6f3ff42

  • SSDEEP

    3072:H030XCIscLlj+c4qw+bpgwozvlHkZNegjc1gBytLIec5gHzLw1sJECboJTyccaFr:Hj+q76LJs4oOLmozL3nsJXck0Ir

Score
10/10

Malware Config

Targets

    • Target

      Dekont.exe

    • Size

      272KB

    • MD5

      aa48863662165dbb591ffaf354a24004

    • SHA1

      6c38c89eb2db8f8cf810d492295ab9105d6b56d1

    • SHA256

      e15efe6abb3771d3bc76e8df6a9208035a5f741c5e8ea4381b48a1cf61d23e7d

    • SHA512

      7d8ac8ff546d2e409d048594c4b4f517426a8f743d11a946634cf85ece3f60e0d5c8b5496b7ff22a61ed424884e63c1f1907a5d869012b1052fc5c01e6f3ff42

    • SSDEEP

      3072:H030XCIscLlj+c4qw+bpgwozvlHkZNegjc1gBytLIec5gHzLw1sJECboJTyccaFr:Hj+q76LJs4oOLmozL3nsJXck0Ir

    Score
    10/10
    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Checks QEMU agent file

      Checks presence of QEMU agent, possibly to detect virtualization.

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks