General

  • Target

    f4df75353727bf3d3bc5bf97321c8fb5_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240925-bt84dszcjc

  • MD5

    f4df75353727bf3d3bc5bf97321c8fb5

  • SHA1

    3d2f8371fb9daec2c184ab0b0c6e56fc9f114cc0

  • SHA256

    fc9d777bc9624053f4e3b1490481ce501db56852114f5183b976e391724db2a6

  • SHA512

    bac369a040c7c81f804fe31bb63dc166bc2ba5ea44d0b17df3203a1aa1ad6962de20f1be30bb314e9631f5ad113b9e2bdaa9a80dd91e6faf944e7e4506ab50ac

  • SSDEEP

    1536:90OlYcDrdLtwmmStpUdvwDwvfE7jTkcbWxOL4jwHQyQDWuAV:nlxrdhrpUmEk7jTkIbia+6V

Malware Config

Extracted

Family

guloader

C2

https://drive.google.com/uc?export=download&id=1nuzERLigTnal8O6BNV8Xe858ZwCbibux

xor.base64

Targets

    • Target

      Order GFD-102747_pdf.exe

    • Size

      172KB

    • MD5

      2ad51df64005dc68130358394d31c1ec

    • SHA1

      fdf85072d44d72c941dbb645ce95a2b015574648

    • SHA256

      d7162b14867eff2ee6b1c0506f91c4e8c1a1cea0ddae632bd49156a179549772

    • SHA512

      13ac7da35ec607e28e50dd49f87b025773caf7436cb9bf8e9a6dff9dd77b188b4355d6a05660e00b0062a6d9961cbb21f89d66126ae657f71503ca5ec813efa8

    • SSDEEP

      1536:PlYcDrdLtwmmStpUdvwDwvfE7jTkcbWxOL4jwHQyQDWuAVG:PlxrdhrpUmEk7jTkIbia+6VG

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Guloader payload

    • Checks QEMU agent file

      Checks presence of QEMU agent, possibly to detect virtualization.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks