General

  • Target

    presupuesto urgente.exe

  • Size

    568KB

  • Sample

    241004-lr7gws1gjf

  • MD5

    8ae672783481c0b46780431bfce5a216

  • SHA1

    ace989f4c2a82f48cc3167e531ab13d2999537b2

  • SHA256

    5e279ef4c54dfc525f423b98054f37ee6eb51a71e8c1f76d5438393055442173

  • SHA512

    be1f8b04c0ff14dfb85089a1311f6fcffaa26db076d6889f756a077503430d7d7ff2cdfc944ed7ef1a47a7f88ad374834c8b945fb96ab1a82f09573c98a54d83

  • SSDEEP

    6144:wIw3/aiZzcfWAnp3NRmqRAV596VJk4PGJ5zkk2vZBKmXSSwrw:Ma/1MVzim5zF2hwymw

Malware Config

Targets

    • Target

      presupuesto urgente.exe

    • Size

      568KB

    • MD5

      8ae672783481c0b46780431bfce5a216

    • SHA1

      ace989f4c2a82f48cc3167e531ab13d2999537b2

    • SHA256

      5e279ef4c54dfc525f423b98054f37ee6eb51a71e8c1f76d5438393055442173

    • SHA512

      be1f8b04c0ff14dfb85089a1311f6fcffaa26db076d6889f756a077503430d7d7ff2cdfc944ed7ef1a47a7f88ad374834c8b945fb96ab1a82f09573c98a54d83

    • SSDEEP

      6144:wIw3/aiZzcfWAnp3NRmqRAV596VJk4PGJ5zkk2vZBKmXSSwrw:Ma/1MVzim5zF2hwymw

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      8b3830b9dbf87f84ddd3b26645fed3a0

    • SHA1

      223bef1f19e644a610a0877d01eadc9e28299509

    • SHA256

      f004c568d305cd95edbd704166fcd2849d395b595dff814bcc2012693527ac37

    • SHA512

      d13cfd98db5ca8dc9c15723eee0e7454975078a776bce26247228be4603a0217e166058ebadc68090afe988862b7514cb8cb84de13b3de35737412a6f0a8ac03

    • SSDEEP

      192:ex24sihno00Wfl97nH6BenXwWobpWBTtvShJ5omi7dJWjOlESlS:h8QIl972eXqlWBFSt273YOlEz

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks