General

  • Target

    dded910ff442d3314400dcd0e7e699ee_JaffaCakes118

  • Size

    96KB

  • Sample

    240913-h1rags1drb

  • MD5

    dded910ff442d3314400dcd0e7e699ee

  • SHA1

    0c11115fd32e2ad3f4b9cf514a4d088b80c61917

  • SHA256

    048455f6416671249ff633c4a0525bb6bb2d6d871de7b74438247c719c2b2103

  • SHA512

    58d51860f2767d70edc18b958540717f5607466c88a193652a324b2646573221a810f11bfd1c317bcacd92fe2aa0754cabc1e0a37fd4037fde8f052a50a504b2

  • SSDEEP

    768:5bUtftRf4UxdhR3evOk4PmvX4OdBh9Ckt0mCIpn942KjNZ:FU574UxdX3eWNM4QBhQkLXn9lKjz

Malware Config

Extracted

Family

guloader

C2

https://drive.google.com/uc?export=download&id=1-oABThuFsnkg4zSME6JGpnZMWcavHifR

xor.base64

Targets

    • Target

      dded910ff442d3314400dcd0e7e699ee_JaffaCakes118

    • Size

      96KB

    • MD5

      dded910ff442d3314400dcd0e7e699ee

    • SHA1

      0c11115fd32e2ad3f4b9cf514a4d088b80c61917

    • SHA256

      048455f6416671249ff633c4a0525bb6bb2d6d871de7b74438247c719c2b2103

    • SHA512

      58d51860f2767d70edc18b958540717f5607466c88a193652a324b2646573221a810f11bfd1c317bcacd92fe2aa0754cabc1e0a37fd4037fde8f052a50a504b2

    • SSDEEP

      768:5bUtftRf4UxdhR3evOk4PmvX4OdBh9Ckt0mCIpn942KjNZ:FU574UxdX3eWNM4QBhQkLXn9lKjz

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Guloader payload

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks