General

  • Target

    a50bf7fe6f5b0a723a53ee261ff61f51dff6a9125b3354cdd70a95feb266eb3f.exe

  • Size

    862KB

  • Sample

    241011-k2rzhsvgkg

  • MD5

    8bafb03143a49a5610e63f7565d2b27a

  • SHA1

    fc3660cb237fbaa698533766ed9f2f8c53492eb3

  • SHA256

    a50bf7fe6f5b0a723a53ee261ff61f51dff6a9125b3354cdd70a95feb266eb3f

  • SHA512

    e569b18d9ba75f59d8f8b226c8bf39a3559dec018fed1c781341ae763f08e7053eba4ab098855979606fc25df5270d9aadda6fc98a8ec747b051746ee0fad9c7

  • SSDEEP

    24576:LiGFaq43NvC0X2ORCujTrlV4oNLbXSwRJ/QOeaj:LiGFu3NvvXztdhNLueJ/qaj

Malware Config

Targets

    • Target

      a50bf7fe6f5b0a723a53ee261ff61f51dff6a9125b3354cdd70a95feb266eb3f.exe

    • Size

      862KB

    • MD5

      8bafb03143a49a5610e63f7565d2b27a

    • SHA1

      fc3660cb237fbaa698533766ed9f2f8c53492eb3

    • SHA256

      a50bf7fe6f5b0a723a53ee261ff61f51dff6a9125b3354cdd70a95feb266eb3f

    • SHA512

      e569b18d9ba75f59d8f8b226c8bf39a3559dec018fed1c781341ae763f08e7053eba4ab098855979606fc25df5270d9aadda6fc98a8ec747b051746ee0fad9c7

    • SSDEEP

      24576:LiGFaq43NvC0X2ORCujTrlV4oNLbXSwRJ/QOeaj:LiGFu3NvvXztdhNLueJ/qaj

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      34442e1e0c2870341df55e1b7b3cccdc

    • SHA1

      99b2fa21aead4b6ccd8ff2f6d3d3453a51d9c70c

    • SHA256

      269d232712c86983336badb40b9e55e80052d8389ed095ebf9214964d43b6bb1

    • SHA512

      4a8c57fb12997438b488b862f3fc9dc0f236e07bb47b2bce6053dcb03ac7ad171842f02ac749f02dda4719c681d186330524cd2953d33cb50854844e74b33d51

    • SSDEEP

      192:jPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4I:u7VpNo8gmOyRsVc4

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks