General

  • Target

    20625a1893d5aff3afa4cdfe0afb56926e45a264f7bc3d5759f69fa0d16798fa

  • Size

    735KB

  • Sample

    241103-yl46sssjax

  • MD5

    a799d4cadf07a3f4f774a94262e0502b

  • SHA1

    7b3159d698fc53901d9d036282a0219f031126b7

  • SHA256

    20625a1893d5aff3afa4cdfe0afb56926e45a264f7bc3d5759f69fa0d16798fa

  • SHA512

    5aa917405f0e053d13caebde52759aa44b4d7bf73b21e816599bfc2611ad20e8d9a15c31f51d3fddabfd2f763a5b448bd3f196ea19da1a074bb481896b6dbef5

  • SSDEEP

    12288:XLYLY7w8UApmtMS0HEUHjrE9xp8tHC911kysibZEzLmi8bkUOD:XMYU8lpm14avoHC1LlKV8bkUOD

Malware Config

Targets

    • Target

      Spec_Tender_3003_850-07-November-2024_PDF.pif

    • Size

      851KB

    • MD5

      629be165860d2336755de85467756639

    • SHA1

      af1da57d01a00bf942e127cce60fb4208bfd9795

    • SHA256

      e9617a78c93e6d5cdc1087dfa6e9bf9d63406e05b6b01135c189242a7c33718c

    • SHA512

      418f56a804212158033b1ae592cafeb8fa1c5a0d9506eb541beb7762c23ebfe5c61dbac8588c350816c229e9f6d77457e361423146874695976c1b8d9267cbff

    • SSDEEP

      24576:ZNAsPMh+Cdd8509puHmATonQ1htKzWbGWO:dPMvA509pkonAhtHbnO

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Loads dropped DLL

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      be2621a78a13a56cf09e00dd98488360

    • SHA1

      75f0539dc6af200a07cdb056cddddec595c6cfd2

    • SHA256

      852047023ba0cae91c7a43365878613cfb4e64e36ff98c460e113d5088d68ef5

    • SHA512

      b80cf1f678e6885276b9a1bfd9227374b2eb9e38bb20446d52ebe2c3dba89764aa50cb4d49df51a974478f3364b5dbcbc5b4a16dc8f1123b40c89c01725be3d1

    • SSDEEP

      192:eB2HS+ihg200uWz947Wzvxu6v0MI7JOde+Ij5Z77dslFsE+:3S62Gw947ExuGDI7J8EF7KIE

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks