General

  • Target

    509fd6b685d99325c1fe38cf5ecac92f1b42b9ce9507180146952099c3f0dd2d

  • Size

    759KB

  • Sample

    240918-qygl9stdrg

  • MD5

    45debf9e83103f876d523cf320525754

  • SHA1

    ed5e3ac301f96b526897ca84ef94914f8d7b74e3

  • SHA256

    509fd6b685d99325c1fe38cf5ecac92f1b42b9ce9507180146952099c3f0dd2d

  • SHA512

    edd51996616a6999f1459ec2bb9ec43249bc0331ab1a7147f162b23a81d982c3442e10673fb78ae93454d46c1d0f12571cf5f768c372917f09a6f8995efb07ec

  • SSDEEP

    12288:vLFSV9YWkCXTM3Ckvl35YR1dbey9iMlCRhKsnqI7hkNodgFvWh2I0TtL6T4btNYc:M9YWRXTMfe1dx9iMIRMsnRNBEWh7KRth

Malware Config

Targets

    • Target

      Payment_Advice..exe

    • Size

      776KB

    • MD5

      fbeaaf9ce7811e21fe27f06c7a467467

    • SHA1

      d061893bc89caeeb6e81252331841b754bdfbc81

    • SHA256

      85e7d1099bfb32ec3c23d289609fb66d8a66b38a69186c75fba7d8a62201855d

    • SHA512

      c59c2f04a275b2ca1e29b5955b09cc9f359bc875bf47fdd0373cd109bca2d163dc2ab2d9fb87ba2d0479095b4e6b76cd17f2447614e7f3e00b6d275488c3eb57

    • SSDEEP

      24576:kfLQAgX9Y+NLTgpkhd/9iMyR2YxNBgMhzQVZ2MsX0u2b:+MJ9Y+NXgiWR22B0chs

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      12KB

    • MD5

      4add245d4ba34b04f213409bfe504c07

    • SHA1

      ef756d6581d70e87d58cc4982e3f4d18e0ea5b09

    • SHA256

      9111099efe9d5c9b391dc132b2faf0a3851a760d4106d5368e30ac744eb42706

    • SHA512

      1bd260cabe5ea3cefbbc675162f30092ab157893510f45a1b571489e03ebb2903c55f64f89812754d3fe03c8f10012b8078d1261a7e73ac1f87c82f714bce03d

    • SSDEEP

      192:VjHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZv0QPi:B/Qlt7wiij/lMRv/9V4bvr

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks