General

  • Target

    e0cc8d60d08f27d75946e331820ed7113ee56715072b5de18730181c7cdd45f8.exe

  • Size

    1.1MB

  • Sample

    240323-c18a4sfa9z

  • MD5

    ca4e4fa38c44dc9eba478b20fe69e9c3

  • SHA1

    c54449ef6efdb7c298728644fc3292497ddb4f91

  • SHA256

    e0cc8d60d08f27d75946e331820ed7113ee56715072b5de18730181c7cdd45f8

  • SHA512

    33daa62c6bf4af9d3c18c2fcb1c888fe0c684c95083adc181d8e4adb4d2b79c5506e0d9a4a79ecc78037217693313006451e54cf1667ad1aa07ba8ecee6cdbbf

  • SSDEEP

    24576:RTfbeKb/h5tFTWNo0WFpVq9PgUq1RkNbXuoQb:RbrbjtkNzWFBlTSbX+

Malware Config

Targets

    • Target

      e0cc8d60d08f27d75946e331820ed7113ee56715072b5de18730181c7cdd45f8.exe

    • Size

      1.1MB

    • MD5

      ca4e4fa38c44dc9eba478b20fe69e9c3

    • SHA1

      c54449ef6efdb7c298728644fc3292497ddb4f91

    • SHA256

      e0cc8d60d08f27d75946e331820ed7113ee56715072b5de18730181c7cdd45f8

    • SHA512

      33daa62c6bf4af9d3c18c2fcb1c888fe0c684c95083adc181d8e4adb4d2b79c5506e0d9a4a79ecc78037217693313006451e54cf1667ad1aa07ba8ecee6cdbbf

    • SSDEEP

      24576:RTfbeKb/h5tFTWNo0WFpVq9PgUq1RkNbXuoQb:RbrbjtkNzWFBlTSbX+

    Score
    10/10
    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      Eminencies/Auld/depopulation.asp

    • Size

      1KB

    • MD5

      9dc829c31369a1fb285618a4c58f3181

    • SHA1

      2706b324245b3ce469c3f9d8d35d97f392594d58

    • SHA256

      45820ae7562dbe707f7393eb65caba8ff3ab61f9c76a650afeca5202cb53200f

    • SHA512

      b260627dba4be927fe11616b1068b485d5d984d791b024ac0cfca0754ca01593e92d0e769876e5b35eaf5260ee03689af56e4a12f08b4f2378dba8955568539a

    Score
    3/10
    • Target

      Eminencies/Auld/tropes.doc

    • Size

      1KB

    • MD5

      9549f27d380527ded73a50063892a61e

    • SHA1

      2db5780e6e0cecc70fc55ece9fd0c51f9fe16647

    • SHA256

      a1ce933545dc9b475bb5292197086b3311d2b89d6109740ac5d7a846e58602bc

    • SHA512

      ddf2406808f68034c5b761c06dab0278f9e7aff3412628c3dbd6bdbcdfcea907f0b15c8d69710fa90520e4f5e20a982b73c47e0b575ee2e369780ede0ec57d4b

    Score
    1/10
    • Target

      Eminencies/Auld/udlovningens.app

    • Size

      1KB

    • MD5

      19efa8d6cdc602a55a4ff019facde55d

    • SHA1

      a045deca2f76b2a21e3ddd0f9a725a7524e5b4e9

    • SHA256

      56387d3006e1cf2422296aaeb3a6428f9c3cbfb734d66e5bb2b4d26981a03507

    • SHA512

      bd18acb252a7ae98ae1dc92bb7e5f88b3696f6d5e2eedd83cc8be56ebfb9690d5d4e56ceb7c8e2cc26373a919afd2460b7b3c3aeda832346f5d0fbd17b68c9e0

    Score
    1/10
    • Target

      Glumpier.deb

    • Size

      1KB

    • MD5

      76de2d8cf74f4347837f989b070b87cf

    • SHA1

      a30002d6d2fa6f67a8df28f9cc3ce07ab340a0d9

    • SHA256

      8d380165f1bb8a3e646e07c3f7bbf0c1a887e0734f654a5116c88158c6c27d66

    • SHA512

      7a89063ece68d47870d958328aa94f98b9f74cbdb44641a2cd2547728b0e079733d6f0d696878a3a68327985d8582fdfaa4ea00bc6208d66592ffef29fb519b8

    Score
    3/10
    • Target

      Lastre.Sul

    • Size

      59KB

    • MD5

      8adf25979779a4f6b21d35a8c5468386

    • SHA1

      5be8189b29e723692f11aa5ca3ae897beed2cea5

    • SHA256

      cd58f9b452bcbd12f789b3d2ef5093a79d5a1fe05ff50a2a316e204630011795

    • SHA512

      dda3f6e4ea0556f2016e687f479d660b3df696201ff8bd6a51b70a7b0c18489f32d53bf1d3a9ff3f09b7f35b6f93dc280fef48616dd6fcc412fc0a68a3d6a3d1

    • SSDEEP

      1536:TngeEU0IElcqLMvGJSgrvIT2qSYopQAjfhIvhZ83skcMjBvzeJIr3Bs2U1g4CXb:TCUWfMeprvrqSYwQAjf2pZ83skZjNze0

    Score
    8/10
    • Modifies Installed Components in the registry

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks