General

  • Target

    ecf0f23b171f136fd346cd1943b9992486805e1546a8ce61dc4d855fe71c0820

  • Size

    735KB

  • Sample

    241103-yp72vsskas

  • MD5

    e721cfa7c653086d836c6532c825ef23

  • SHA1

    c9b6a22cc40c2d9c72a00831b99a31883a409640

  • SHA256

    ecf0f23b171f136fd346cd1943b9992486805e1546a8ce61dc4d855fe71c0820

  • SHA512

    61d52904e6336534ea1a57e5f80578f7a3faa66441ea8e6f261c4e96243966e4c0445f032dfcd3bad2280d2a2c61e43fe56aea9667fa2368018bf716043d38bb

  • SSDEEP

    12288:VLYLY7w8UApmtMS0HEUHjrE9xp8tHC911kysibZEzLmi8bkUO/:VMYU8lpm14avoHC1LlKV8bkUO/

Malware Config

Targets

    • Target

      Letter of Intent (LOI) For the Company November 2024 PDF.pif

    • Size

      851KB

    • MD5

      629be165860d2336755de85467756639

    • SHA1

      af1da57d01a00bf942e127cce60fb4208bfd9795

    • SHA256

      e9617a78c93e6d5cdc1087dfa6e9bf9d63406e05b6b01135c189242a7c33718c

    • SHA512

      418f56a804212158033b1ae592cafeb8fa1c5a0d9506eb541beb7762c23ebfe5c61dbac8588c350816c229e9f6d77457e361423146874695976c1b8d9267cbff

    • SSDEEP

      24576:ZNAsPMh+Cdd8509puHmATonQ1htKzWbGWO:dPMvA509pkonAhtHbnO

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Loads dropped DLL

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      be2621a78a13a56cf09e00dd98488360

    • SHA1

      75f0539dc6af200a07cdb056cddddec595c6cfd2

    • SHA256

      852047023ba0cae91c7a43365878613cfb4e64e36ff98c460e113d5088d68ef5

    • SHA512

      b80cf1f678e6885276b9a1bfd9227374b2eb9e38bb20446d52ebe2c3dba89764aa50cb4d49df51a974478f3364b5dbcbc5b4a16dc8f1123b40c89c01725be3d1

    • SSDEEP

      192:eB2HS+ihg200uWz947Wzvxu6v0MI7JOde+Ij5Z77dslFsE+:3S62Gw947ExuGDI7J8EF7KIE

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks