General

  • Target

    Connectible.exe

  • Size

    1.2MB

  • Sample

    231011-ygtt9shd41

  • MD5

    40437f4bc8980c7b1aeb9aebc64de972

  • SHA1

    54ec92ddbfdc8ed68591e1563745eedb651c7f29

  • SHA256

    b4e586ae4fe78a41c0da390b0b7d9e054e93cf62e5f06f9fd62ed946aae0930c

  • SHA512

    fd001d0698fe2a7221882005a4e557a1e020b3366688a015370c40214cd29348002286cd6e7a0a8ea2912ba6c671068e82fac5062d8bfa42375a89a5d104159b

  • SSDEEP

    24576:gqG+Vm6IaJe7vTz8Nk95ACjKC4onl8Q3wlRjMPybTJmU8:LGP6IaJe7nSIACjKCxl13ojMPybl6

Score
10/10

Malware Config

Targets

    • Target

      Connectible.exe

    • Size

      1.2MB

    • MD5

      40437f4bc8980c7b1aeb9aebc64de972

    • SHA1

      54ec92ddbfdc8ed68591e1563745eedb651c7f29

    • SHA256

      b4e586ae4fe78a41c0da390b0b7d9e054e93cf62e5f06f9fd62ed946aae0930c

    • SHA512

      fd001d0698fe2a7221882005a4e557a1e020b3366688a015370c40214cd29348002286cd6e7a0a8ea2912ba6c671068e82fac5062d8bfa42375a89a5d104159b

    • SSDEEP

      24576:gqG+Vm6IaJe7vTz8Nk95ACjKC4onl8Q3wlRjMPybTJmU8:LGP6IaJe7nSIACjKCxl13ojMPybl6

    Score
    10/10
    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Checks QEMU agent file

      Checks presence of QEMU agent, possibly to detect virtualization.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks