General

  • Target

    Hemoid.exe

  • Size

    903KB

  • Sample

    241030-w8ajlazrcq

  • MD5

    86775a764aea392246a92799be91dd13

  • SHA1

    df06f5d609bfe3861567f2b32769f32ddae17341

  • SHA256

    e8b00d362280ad03511b44e1e16b92bff4468547a2cd2b5231962653f18be194

  • SHA512

    5caea228fc466f9780a73df8755c8beb2ee1809df74bb6d40a6dec78428f1620491f556fa50236d2126688600205bb1d2e9b1b6a665f594ce54f705ba7d28cbb

  • SSDEEP

    12288:7/x+rNj8OdRDQOjJ+bLJxoATfDx209q7s62W++uMBIVm7MIBXBKGzaeKBemnZ6:bx+rddRkiyoAzD5wY62HnQIQMOKOaeKE

Malware Config

Targets

    • Target

      Hemoid.exe

    • Size

      903KB

    • MD5

      86775a764aea392246a92799be91dd13

    • SHA1

      df06f5d609bfe3861567f2b32769f32ddae17341

    • SHA256

      e8b00d362280ad03511b44e1e16b92bff4468547a2cd2b5231962653f18be194

    • SHA512

      5caea228fc466f9780a73df8755c8beb2ee1809df74bb6d40a6dec78428f1620491f556fa50236d2126688600205bb1d2e9b1b6a665f594ce54f705ba7d28cbb

    • SSDEEP

      12288:7/x+rNj8OdRDQOjJ+bLJxoATfDx209q7s62W++uMBIVm7MIBXBKGzaeKBemnZ6:bx+rddRkiyoAzD5wY62HnQIQMOKOaeKE

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      c9473cb90d79a374b2ba6040ca16e45c

    • SHA1

      ab95b54f12796dce57210d65f05124a6ed81234a

    • SHA256

      b80a5cba69d1853ed5979b0ca0352437bf368a5cfb86cb4528edadd410e11352

    • SHA512

      eafe7d5894622bc21f663bca4dd594392ee0f5b29270b6b56b0187093d6a3a103545464ff6398ad32d2cf15dab79b1f133218ba9ba337ddc01330b5ada804d7b

    • SSDEEP

      192:cPtkumJX7zBE2kGwfy9S9VkPsFQ1MZ1c:N7O2k5q9wA1MZa

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks