General

  • Target

    23bbcf4afa025004fe089a67cf444068_JaffaCakes118

  • Size

    68KB

  • Sample

    240508-hvvqqaah53

  • MD5

    23bbcf4afa025004fe089a67cf444068

  • SHA1

    52f5b7911b81e7642a3ca57a82da9985b8651b96

  • SHA256

    3c33e6937e13636c74f6af17483efa0ce5985fa4cf24fa3b67aab656bd3d14a8

  • SHA512

    29a88f3181f65ee13fa2a6ec87a16558df9449f9f95c51d078c9b09416e389db30e19588aad0e69642ad3071a25b16f4da56a246a1a6b1a47e0eb222904481b8

  • SSDEEP

    1536:zrTK7c6PAk8EJPPPPXMCiq1MU5BPWQjo4iktl:zSPjJPPPPXUNM1WN4P

Score
10/10

Malware Config

Extracted

Family

guloader

C2

https://onedrive.live.com/download?cid=6BE8F132430D55A2&resid=6BE8F132430D55A2%21128&authkey=AB-gr2sRaVtcAns

xor.base64

Targets

    • Target

      23bbcf4afa025004fe089a67cf444068_JaffaCakes118

    • Size

      68KB

    • MD5

      23bbcf4afa025004fe089a67cf444068

    • SHA1

      52f5b7911b81e7642a3ca57a82da9985b8651b96

    • SHA256

      3c33e6937e13636c74f6af17483efa0ce5985fa4cf24fa3b67aab656bd3d14a8

    • SHA512

      29a88f3181f65ee13fa2a6ec87a16558df9449f9f95c51d078c9b09416e389db30e19588aad0e69642ad3071a25b16f4da56a246a1a6b1a47e0eb222904481b8

    • SSDEEP

      1536:zrTK7c6PAk8EJPPPPXMCiq1MU5BPWQjo4iktl:zSPjJPPPPXUNM1WN4P

    Score
    10/10
    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks