General

  • Target

    PO No. 0146850827805 HSP00598420.exe

  • Size

    1.1MB

  • Sample

    241104-mabjka1ndp

  • MD5

    be8f9aeb5caa110946c26b51073394c2

  • SHA1

    aef14aba6b6e241b2e1b30ec79426cd070b1c421

  • SHA256

    f693c8b77350a926172ea22f3447fd74071cfb014344f29234348704f880e3c2

  • SHA512

    20f1dcd5f3810d823cda6ba627a9c8b004c275f704d571d491fca947ace5e4866aa1cb67c35aabb7ee5d99c31f6af7428c94c843117daae550c31efc7fc49054

  • SSDEEP

    24576:x4nhDoAFKhX4McljuqV+XcFpQBNFE5dZNXLGQ7WczkxFnfbP90:x+hkl1CVuS4n5EtNXKQKczg2

Malware Config

Targets

    • Target

      PO No. 0146850827805 HSP00598420.exe

    • Size

      1.1MB

    • MD5

      be8f9aeb5caa110946c26b51073394c2

    • SHA1

      aef14aba6b6e241b2e1b30ec79426cd070b1c421

    • SHA256

      f693c8b77350a926172ea22f3447fd74071cfb014344f29234348704f880e3c2

    • SHA512

      20f1dcd5f3810d823cda6ba627a9c8b004c275f704d571d491fca947ace5e4866aa1cb67c35aabb7ee5d99c31f6af7428c94c843117daae550c31efc7fc49054

    • SSDEEP

      24576:x4nhDoAFKhX4McljuqV+XcFpQBNFE5dZNXLGQ7WczkxFnfbP90:x+hkl1CVuS4n5EtNXKQKczg2

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      12KB

    • MD5

      d6f54d2cefdf58836805796f55bfc846

    • SHA1

      b980addc1a755b968dd5799179d3b4f1c2de9d2d

    • SHA256

      f917aef484d1fbb4d723b2e2d3045cb6f5f664e61fbb3d5c577bd1c215de55d9

    • SHA512

      ce67da936a93d46ef7e81abc8276787c82fd844c03630ba18afc3528c7e420c3228bfe82aeda083bb719f2d1314afae913362abd1e220cb364606519690d45db

    • SSDEEP

      192:acA1YOTDExj7EFrYCT4E8y3hoSdtTgwF43E7QbGPXI9uIc6w79Mw:RR7SrtTv53tdtTgwF4SQbGPX36wJMw

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks