General

  • Target

    75605c308921c90b4d3aeb047fdf75ca377f5e9f330add91d5c383ad0ea5858c

  • Size

    577KB

  • Sample

    240924-yyernsweje

  • MD5

    25b6d632fbc5cf975c442e67d2b750b6

  • SHA1

    2eaf98b8ab20e2dfd931a6450c848f5b317676b3

  • SHA256

    75605c308921c90b4d3aeb047fdf75ca377f5e9f330add91d5c383ad0ea5858c

  • SHA512

    056647cb40c90a3433da7cd89c3e944cf7b10ccaf9a8d52e598029a5098057833aa3794ceb2e2baf30a7f075ecc5daea32b8bf048a8f639954541f485e75ec9c

  • SSDEEP

    12288:FZ5MEWr5P5S3B0WCrtoZODMjtCzt8TSY3Rha4xQNmcgvZl3A9i:FZ5W5PEantcODMha4aNwvZl3Ac

Malware Config

Targets

    • Target

      RFQ.exe

    • Size

      657KB

    • MD5

      7ec1521d2e72494307e4b54a5e96bc76

    • SHA1

      0c87b286ab368dbe6ef746840e9e69ced7bdf568

    • SHA256

      6b0132113d71e94f827ae1e92c0ebe1e37517686c394b226f88ea8093afd18b8

    • SHA512

      ca1a05aef72c06f86b7f0a3da233f0c8315e29d471a1460414a985fa936caec1f7e5ae7f7196a67289aaae75aa3db08129285813b83ab91329e6964f20a8e3c2

    • SSDEEP

      12288:lyHHeM8WrL7tShhYWCxtoBOVg7tCVtWTSYQYaGPmcaOadF1umV34:UH+CL7I0VtSOVgCYaGPsF1umV34

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Loads dropped DLL

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      cf85183b87314359488b850f9e97a698

    • SHA1

      6b6c790037eec7ebea4d05590359cb4473f19aea

    • SHA256

      3b6a5cb2a3c091814fce297c04fb677f72732fb21615102c62a195fdc2e7dfac

    • SHA512

      fe484b3fc89aeed3a6b71b90b90ea11a787697e56be3077154b6ddc2646850f6c38589ed422ff792e391638a80a778d33f22e891e76b5d65896c6fb4696a2c3b

    • SSDEEP

      96:3IsUxO9udx4qYp7AJb76BykUbQMtHUOA5Iv+RnsrqeXV+d1g2IW9t2c+cEwF9oug:YVL7ikJb76BQUoUm+RnyXVYO2RvHoug

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks