General

  • Target

    FV- 12.429 TUSOCAL.exe

  • Size

    429KB

  • Sample

    240430-qsc2wsga8v

  • MD5

    566a9fbd642c4a82e90316c224cc095c

  • SHA1

    bd2741e788f69eb3cb56f1cee3fad112838d740e

  • SHA256

    d4be2f3cfa3365cf4b7d567839a2d31f7d0683bcc39e3abd041f1cfbb6b6bbae

  • SHA512

    7e27ececc7f952f9231dfff21eda0211edd6a247d1d884c5ffc11af1d708735bc459d11b6ddd03fed7986f1605fd69beb9d3f782b1ab211f2c7f90f02c0928f5

  • SSDEEP

    6144:7pkXGh6tHk47x2IIjpLUJpJ0IgB9AvCF1RIJ+oBlGORmbrKydSBmpJ3PVF97/ENI:2ZHkkx2IIdLdPAvCjRIEZVxdSwb

Score
10/10

Malware Config

Targets

    • Target

      FV- 12.429 TUSOCAL.exe

    • Size

      429KB

    • MD5

      566a9fbd642c4a82e90316c224cc095c

    • SHA1

      bd2741e788f69eb3cb56f1cee3fad112838d740e

    • SHA256

      d4be2f3cfa3365cf4b7d567839a2d31f7d0683bcc39e3abd041f1cfbb6b6bbae

    • SHA512

      7e27ececc7f952f9231dfff21eda0211edd6a247d1d884c5ffc11af1d708735bc459d11b6ddd03fed7986f1605fd69beb9d3f782b1ab211f2c7f90f02c0928f5

    • SSDEEP

      6144:7pkXGh6tHk47x2IIjpLUJpJ0IgB9AvCF1RIJ+oBlGORmbrKydSBmpJ3PVF97/ENI:2ZHkkx2IIdLdPAvCjRIEZVxdSwb

    Score
    10/10
    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      fc3772787eb239ef4d0399680dcc4343

    • SHA1

      db2fa99ec967178cd8057a14a428a8439a961a73

    • SHA256

      9b93c61c9d63ef8ec80892cc0e4a0877966dca9b0c3eb85555cebd2ddf4d6eed

    • SHA512

      79e491ca4591a5da70116114b7fbb66ee15a0532386035e980c9dfe7afb59b1f9d9c758891e25bfb45c36b07afd3e171bac37a86c887387ef0e80b1eaf296c89

    • SSDEEP

      192:eS24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35OloSl:S8QIl975eXqlWBrz7YLOlo

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks