General

  • Target

    fae9e944e39fec77899d87f3ae45fbf4_JaffaCakes118

  • Size

    40KB

  • Sample

    240927-z1by8szcrk

  • MD5

    fae9e944e39fec77899d87f3ae45fbf4

  • SHA1

    e230dd07e804b12eb238984e8da85b7ca03a8148

  • SHA256

    e1e0b4d13fef5e47cfed1e8ceb1bfd8175799fe22ad8f18c877d85ed5a72aab8

  • SHA512

    3dfd4ce531bb57fcc494d3e0956dcc1c807f6aa5a55751b4a5b255f1bed2e5e5a346362b3abfe485bb5e3b84c25e407a7daf5783358bec7fcb3148446fd26f42

  • SSDEEP

    768:Q00ItI3/oAShP4R0cGiu5uJVYjsjB2rAk7wecVRXXslrRNBNAr:D0ItI3gH2ycGiu5iH1Y3caFN8

Malware Config

Extracted

Family

guloader

C2

https://drive.google.com/uc?export=download&id=1_C89SIhHOlv9l9ZnU366hDceUJ5YArTR

xor.base64

Targets

    • Target

      document.exe

    • Size

      88KB

    • MD5

      3a29ec5e78273a5d9497afe943102c89

    • SHA1

      b14457eed801b28dde491f6c8879def4df63ec42

    • SHA256

      230d41b01617fcee8d5a438a5df4bc75910be2aa65e173ce11f7b1ed51c591a1

    • SHA512

      10de5acf84a34818c35f267982b6acd131790568b37991cd8993b449d5d7a2c6403626b5c2cea58942a33a7bf1691c8850a625022408abd88ca4e034f626835f

    • SSDEEP

      1536:L0pjfh9/kfVbJyrFDDmr7UcFETuEZsZyVoNrFDDmr7UclVbifh9/k:wXiVSFDD8nmTuEZsYEFDD8nlV+X

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Guloader payload

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks