General

  • Target

    11cee33d92011eea1991e21d5070accf_JaffaCakes118

  • Size

    48KB

  • Sample

    240504-jyxvxsgb2v

  • MD5

    11cee33d92011eea1991e21d5070accf

  • SHA1

    a6bab3e325e918e57c5a37113b3a46d96f54c9c6

  • SHA256

    1fa7e0611a72d7fd8983adf3bade1823344df34a513e18069f4109c3b5eec6c9

  • SHA512

    e72049addd3c949078c5d7b2d2f915297de17e8e2d3262e0a69ce5622ef6c413bff32c55a38f7a32df2b99568e961cdac698db728832ba1778883f7ebb7e76cf

  • SSDEEP

    768:JofhW0LEzBRo9sysyaHJBaXDhSfHedss:JofFEw9dd0JBaXDwHeus

Malware Config

Extracted

Family

guloader

C2

https://onedrive.live.com/download?cid=3CD33A1FBE48E5E5&resid=3CD33A1FBE48E5E5%21106&authkey=AODBa9WAwtEu5iY

xor.base64

Targets

    • Target

      11cee33d92011eea1991e21d5070accf_JaffaCakes118

    • Size

      48KB

    • MD5

      11cee33d92011eea1991e21d5070accf

    • SHA1

      a6bab3e325e918e57c5a37113b3a46d96f54c9c6

    • SHA256

      1fa7e0611a72d7fd8983adf3bade1823344df34a513e18069f4109c3b5eec6c9

    • SHA512

      e72049addd3c949078c5d7b2d2f915297de17e8e2d3262e0a69ce5622ef6c413bff32c55a38f7a32df2b99568e961cdac698db728832ba1778883f7ebb7e76cf

    • SSDEEP

      768:JofhW0LEzBRo9sysyaHJBaXDhSfHedss:JofFEw9dd0JBaXDwHeus

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Guloader payload

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks