General

  • Target

    10c6429825adaba12c34696a8ff00879b2abbb88.rl

  • Size

    254KB

  • Sample

    240426-xnr4ksah9z

  • MD5

    ab5050f0b4b71352722a6122c8107f83

  • SHA1

    10c6429825adaba12c34696a8ff00879b2abbb88

  • SHA256

    7da5b2207cf789cf6807b6cc3373048cbc951d7fd09ca8fb858693cfa5f5edba

  • SHA512

    ad2608ab646b697504286a909b1f3f454195ba527baa3a27f293f74464a0ca81aac635251f9c8cda2cf9f08650377026f5f7d1fddaa21f4573938c0f2671b8d0

  • SSDEEP

    6144:QQLFhcSHzlojz8oz64NGsj7y78a/YstUX:1FaSRcWCGJz/tW

Malware Config

Targets

    • Target

      10c6429825adaba12c34696a8ff00879b2abbb88.rl

    • Size

      254KB

    • MD5

      ab5050f0b4b71352722a6122c8107f83

    • SHA1

      10c6429825adaba12c34696a8ff00879b2abbb88

    • SHA256

      7da5b2207cf789cf6807b6cc3373048cbc951d7fd09ca8fb858693cfa5f5edba

    • SHA512

      ad2608ab646b697504286a909b1f3f454195ba527baa3a27f293f74464a0ca81aac635251f9c8cda2cf9f08650377026f5f7d1fddaa21f4573938c0f2671b8d0

    • SSDEEP

      6144:QQLFhcSHzlojz8oz64NGsj7y78a/YstUX:1FaSRcWCGJz/tW

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Checks QEMU agent file

      Checks presence of QEMU agent, possibly to detect virtualization.

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks