General

  • Target

    30102024_0120_29102024_PEDIDO.rar

  • Size

    750KB

  • Sample

    241030-bqdhbasldy

  • MD5

    b1c32624da3d5109caa6b225f79a71ed

  • SHA1

    54aab4a492681c599c857ec485dd403f33989bc5

  • SHA256

    eccc0b1a8a0cc1fa0ecc235f09a927349f20330751c8f0f87fc977b7b5763d1f

  • SHA512

    9e9974b182de9e288247ac682b4674e7cd1e1a21cd327ddb9400a82b9935a0551d8a20e0fe7a20437b7ed0615751296968b987648527865810801fe95cae7102

  • SSDEEP

    12288:K5nIJZx/stcZ+nmyEPJK01pB8jREFMYU1EoorYKduHAyv3+pmHvwlm6mOr1gQzAQ:EnY4tcYLEPY2XtM6o3KaotE4rkTygs62

Malware Config

Targets

    • Target

      Papmlken.exe

    • Size

      897KB

    • MD5

      f7861077df1c126558e396dd2011ef6b

    • SHA1

      c8e5a886a2fde8a2d1c4b55d2521855afc8a978b

    • SHA256

      d015e6ce88f2d44bacf7b9d17d1341d071835570263c5c87dbf12e7674b2597a

    • SHA512

      d012a8e962e68ffcb482a67957d199e00090774b5501f8bb8eb5e6402283eae2b481369187c0a0ffc9fee9a3fdc55827b4625e6ec9e66d1f2bb48b181eb077ea

    • SSDEEP

      24576:Ax+ra+8DOCqv2LqoAzIusXT62HnQIQMOKOaeKx:Ax+2+8DEuLqFzeXm2HTzOKOwx

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      c9473cb90d79a374b2ba6040ca16e45c

    • SHA1

      ab95b54f12796dce57210d65f05124a6ed81234a

    • SHA256

      b80a5cba69d1853ed5979b0ca0352437bf368a5cfb86cb4528edadd410e11352

    • SHA512

      eafe7d5894622bc21f663bca4dd594392ee0f5b29270b6b56b0187093d6a3a103545464ff6398ad32d2cf15dab79b1f133218ba9ba337ddc01330b5ada804d7b

    • SSDEEP

      192:cPtkumJX7zBE2kGwfy9S9VkPsFQ1MZ1c:N7O2k5q9wA1MZa

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks