General

  • Target

    30102024_0118_29102024_Bestellung.7z

  • Size

    742KB

  • Sample

    241030-bpbx4atemp

  • MD5

    45001751aae993a57dc7433617d114ff

  • SHA1

    d1837bd7813f0b9fcc003035095521e466e0b6a5

  • SHA256

    b13417ae29a0b5dc10cb8176006034c61d41fd9e20037c4023ab514b193fa69a

  • SHA512

    446020ced9dc03c90785686cfb879b9f54013cc78fa3444a1a052e46c098c5f8948835b5f067b27fbf9a34b996875a6bb88b4a246574ef2c9d02d37569aab33f

  • SSDEEP

    12288:q3Npn7fRLf36ORGbdJ4M50PwpwKP2ZzIevIeOrMEAZvRrkYCHRttl9jjpCuB1Lwa:q3NpzRz36oJIpV2ZzSeuMEATrluRttll

Malware Config

Targets

    • Target

      Bestellung.exe

    • Size

      804KB

    • MD5

      c56f440f15955f0cae85df17d5a52140

    • SHA1

      3c5c933bf8b68b04f621a5c70c9562d06e857bbd

    • SHA256

      d539aa17bfa95bc25c81308a99a1c834cb28ad23f1ce8bc3715066471bd5d0f7

    • SHA512

      7b191331b52c99ab9bac9c12be29d59f7efb705d4af1efdee2d05b887143398e8442f11664ae4c4b6716ecff2a729a5496b04c6f9e3fbc97e211d2b50c86312c

    • SSDEEP

      24576:qG+yqROz6skIpE2NVPl7LE8oy9jRKta3uja581CL:NMRnsn1NVt7L7o/ap

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Loads dropped DLL

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      12KB

    • MD5

      192639861e3dc2dc5c08bb8f8c7260d5

    • SHA1

      58d30e460609e22fa0098bc27d928b689ef9af78

    • SHA256

      23d618a0293c78ce00f7c6e6dd8b8923621da7dd1f63a070163ef4c0ec3033d6

    • SHA512

      6e573d8b2ef6ed719e271fd0b2fd9cd451f61fc9a9459330108d6d7a65a0f64016303318cad787aa1d5334ba670d8f1c7c13074e1be550b4a316963ecc465cdc

    • SSDEEP

      192:ljHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZqE0QPi:R/Qlt7wiij/lMRv/9V4bfr

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks