General

  • Target

    List of Items Ref_02839273882.exe

  • Size

    624KB

  • Sample

    240925-g9hh9szfml

  • MD5

    50ade32ff9b174e1ce5788d9b0382bcc

  • SHA1

    47945e27bb8c49412cb405281d57c28af7db0812

  • SHA256

    635057b83f36b7fd2061a67442e4bc6115b7bff972cf86bd0941bde151eb9cfe

  • SHA512

    155fa422dd5e74606528179aa147a0ebfeea3a29154b97885dd1741ad9feb6d37dd64ed122381ee691ecfdc4d4335659ce6f7484414d948ceaf16eca2c1f1787

  • SSDEEP

    12288:VY+T5LbPV56MWGSf9sdrHbgeaWA+1DLTW:VYYLbr6MhS64eNw

Malware Config

Targets

    • Target

      List of Items Ref_02839273882.exe

    • Size

      624KB

    • MD5

      50ade32ff9b174e1ce5788d9b0382bcc

    • SHA1

      47945e27bb8c49412cb405281d57c28af7db0812

    • SHA256

      635057b83f36b7fd2061a67442e4bc6115b7bff972cf86bd0941bde151eb9cfe

    • SHA512

      155fa422dd5e74606528179aa147a0ebfeea3a29154b97885dd1741ad9feb6d37dd64ed122381ee691ecfdc4d4335659ce6f7484414d948ceaf16eca2c1f1787

    • SSDEEP

      12288:VY+T5LbPV56MWGSf9sdrHbgeaWA+1DLTW:VYYLbr6MhS64eNw

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Loads dropped DLL

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      12KB

    • MD5

      cff85c549d536f651d4fb8387f1976f2

    • SHA1

      d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e

    • SHA256

      8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8

    • SHA512

      531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88

    • SSDEEP

      192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks