General

  • Target

    994a4a3cf93dc66d897c15bbc70dba6740d458e90de22ed91be6fe0f769497a5

  • Size

    597KB

  • Sample

    240923-n2z7nswbmr

  • MD5

    3c6be6f211f3e4de8d3d9ef96f7545e2

  • SHA1

    8f7c80b4c5c3ed695ad7bb4f6b90561bd2b1bd61

  • SHA256

    994a4a3cf93dc66d897c15bbc70dba6740d458e90de22ed91be6fe0f769497a5

  • SHA512

    32a136051a257bf763c9f3274afdb52969520f639b5116c34d437f32098d58bec4a4b37e0f2a41e329d78fcb91d025c4ebc50c2a40b11d0f9490967abf6b975d

  • SSDEEP

    12288:kN1jxSC+9ChkMSWjLNogzMIXJoz3YZFBYhaVwha6/BEUJhb2PIvad:kNnSJgSIdAIXJoLYZYhaKha6/a+hCPIA

Malware Config

Targets

    • Target

      RFQ.exe

    • Size

      676KB

    • MD5

      0915cd03cefe498671482b7e6282c13f

    • SHA1

      30dc8076fd385de137a5d7a6c997da3079db4870

    • SHA256

      4cecdff125e6e1bccd1d23ac44e5a51465179fd197e90acf5d4251804d4b08a3

    • SHA512

      c6822df5f81e84e62089205960afbbe28e263cbf7dad5cfb40330b72dd20bd84c87d8b81d04adbfd46353fd19126684c8d6ba4a8e7a239b16cf8fc09f6d8d25d

    • SSDEEP

      12288:VyHG5S4+9qbkMSWj1NSgzAIXJo5XYlFBohQgaGaQUJhlufF1uma:EHOSfUSItcIXJo1YFohQgaGz+hIfF1uF

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Loads dropped DLL

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      cf85183b87314359488b850f9e97a698

    • SHA1

      6b6c790037eec7ebea4d05590359cb4473f19aea

    • SHA256

      3b6a5cb2a3c091814fce297c04fb677f72732fb21615102c62a195fdc2e7dfac

    • SHA512

      fe484b3fc89aeed3a6b71b90b90ea11a787697e56be3077154b6ddc2646850f6c38589ed422ff792e391638a80a778d33f22e891e76b5d65896c6fb4696a2c3b

    • SSDEEP

      96:3IsUxO9udx4qYp7AJb76BykUbQMtHUOA5Iv+RnsrqeXV+d1g2IW9t2c+cEwF9oug:YVL7ikJb76BQUoUm+RnyXVYO2RvHoug

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks