General

  • Target

    f6ef1a6136f4020eea6211db56904d50_JaffaCakes118

  • Size

    40KB

  • Sample

    240925-1t23hszdnk

  • MD5

    f6ef1a6136f4020eea6211db56904d50

  • SHA1

    7ebd6339ea304e1dbe96117250d11758e2286382

  • SHA256

    2e22c6bd477f822942d1900435f0e879a1f7e41b6e8f118c8df2e2119520de14

  • SHA512

    73da1fefaec327bc57381d0ae0be59c062817a653ca7a4b9b916f0a4b4f88e22dadc072d3ceef0fd22a5c431d7a4ee19a27891fbc6c3e453a350949e043f6ca3

  • SSDEEP

    768:UsQvcH/JfZ8bCOXOxXxL7X0f877Z84EFHjy:UsQ0HhhnJu87V8xjy

Malware Config

Extracted

Family

guloader

C2

http://bnsddfhjdfgvbxc.ru/disabler_encrypted_F0749AF.bin

https://drive.google.com/file/d/1XCdocfzNt5EO13N2GeXmsTfCEgvMuPqk/view?usp=sharing

xor.base64

Targets

    • Target

      f6ef1a6136f4020eea6211db56904d50_JaffaCakes118

    • Size

      40KB

    • MD5

      f6ef1a6136f4020eea6211db56904d50

    • SHA1

      7ebd6339ea304e1dbe96117250d11758e2286382

    • SHA256

      2e22c6bd477f822942d1900435f0e879a1f7e41b6e8f118c8df2e2119520de14

    • SHA512

      73da1fefaec327bc57381d0ae0be59c062817a653ca7a4b9b916f0a4b4f88e22dadc072d3ceef0fd22a5c431d7a4ee19a27891fbc6c3e453a350949e043f6ca3

    • SSDEEP

      768:UsQvcH/JfZ8bCOXOxXxL7X0f877Z84EFHjy:UsQ0HhhnJu87V8xjy

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Guloader payload

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks