General

  • Target

    0a8d5b66dab989ff7310b8155fbbe51c_JaffaCakes118

  • Size

    92KB

  • Sample

    240430-19d1maba54

  • MD5

    0a8d5b66dab989ff7310b8155fbbe51c

  • SHA1

    a28e9366d125ca00bffb709eae902b71fa94c432

  • SHA256

    5c5e317ad1fee46ff701e4b69e41b7f117f995e9e7d5e189d4f35d903a93151b

  • SHA512

    d341079fab7c81c5649f0e33d85817da0ed866633a40bac6b22275629ecd6cc94fdb7f1f3efd290a2ba13789ad1430da40ab8128ac0f7c94e3f5d83a8c78a065

  • SSDEEP

    1536:vjNgIyddH//A6Na617d3R6ofimrSQA6Na617d3ZgIyddH/:bNfyddfPf6YSy7fyddf

Malware Config

Targets

    • Target

      0a8d5b66dab989ff7310b8155fbbe51c_JaffaCakes118

    • Size

      92KB

    • MD5

      0a8d5b66dab989ff7310b8155fbbe51c

    • SHA1

      a28e9366d125ca00bffb709eae902b71fa94c432

    • SHA256

      5c5e317ad1fee46ff701e4b69e41b7f117f995e9e7d5e189d4f35d903a93151b

    • SHA512

      d341079fab7c81c5649f0e33d85817da0ed866633a40bac6b22275629ecd6cc94fdb7f1f3efd290a2ba13789ad1430da40ab8128ac0f7c94e3f5d83a8c78a065

    • SSDEEP

      1536:vjNgIyddH//A6Na617d3R6ofimrSQA6Na617d3ZgIyddH/:bNfyddfPf6YSy7fyddf

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Guloader payload

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Tasks