General

  • Target

    b2426e309ead760310407e71b9c0d04d85c589f2136bb4e9b0f06021664cd067

  • Size

    96KB

  • Sample

    230806-erfkvafh22

  • MD5

    933f755f0b5c6b821d59712409a265c3

  • SHA1

    358972e82feea793fe646ec42fc0e9163cde12f5

  • SHA256

    b2426e309ead760310407e71b9c0d04d85c589f2136bb4e9b0f06021664cd067

  • SHA512

    d98c08d136f479ef2726689e3cb08af15053df7725d1cbd11c7eb0b05e0aaf3365ff69d46eb4d22aa9995f6341916c85992fd8976ee01a84ee5dada1735d8afe

  • SSDEEP

    1536:67bd11PaHOjCuE6kSfrZ/21S4I7tCLpJ566O7Co/24H6nom7va:67bdzagvEqTln4qYda

Malware Config

Extracted

Family

guloader

C2

https://drive.google.com/uc?export=download&id=10KsM06yOLfy26ZHD2zjAI-6ZbVIvJEOS

xor.base64

Targets

    • Target

      b2426e309ead760310407e71b9c0d04d85c589f2136bb4e9b0f06021664cd067

    • Size

      96KB

    • MD5

      933f755f0b5c6b821d59712409a265c3

    • SHA1

      358972e82feea793fe646ec42fc0e9163cde12f5

    • SHA256

      b2426e309ead760310407e71b9c0d04d85c589f2136bb4e9b0f06021664cd067

    • SHA512

      d98c08d136f479ef2726689e3cb08af15053df7725d1cbd11c7eb0b05e0aaf3365ff69d46eb4d22aa9995f6341916c85992fd8976ee01a84ee5dada1735d8afe

    • SSDEEP

      1536:67bd11PaHOjCuE6kSfrZ/21S4I7tCLpJ566O7Co/24H6nom7va:67bdzagvEqTln4qYda

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Guloader payload

    • Checks QEMU agent state file

      Checks state file used by QEMU agent, possibly to detect virtualization.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

1
T1012

Virtualization/Sandbox Evasion

1
T1497

Tasks