General

  • Target

    Letter of Intent (LOI) For the Company November 2024 PDF.pif.exe

  • Size

    851KB

  • Sample

    241106-x8cvdswelf

  • MD5

    629be165860d2336755de85467756639

  • SHA1

    af1da57d01a00bf942e127cce60fb4208bfd9795

  • SHA256

    e9617a78c93e6d5cdc1087dfa6e9bf9d63406e05b6b01135c189242a7c33718c

  • SHA512

    418f56a804212158033b1ae592cafeb8fa1c5a0d9506eb541beb7762c23ebfe5c61dbac8588c350816c229e9f6d77457e361423146874695976c1b8d9267cbff

  • SSDEEP

    24576:ZNAsPMh+Cdd8509puHmATonQ1htKzWbGWO:dPMvA509pkonAhtHbnO

Malware Config

Targets

    • Target

      Letter of Intent (LOI) For the Company November 2024 PDF.pif.exe

    • Size

      851KB

    • MD5

      629be165860d2336755de85467756639

    • SHA1

      af1da57d01a00bf942e127cce60fb4208bfd9795

    • SHA256

      e9617a78c93e6d5cdc1087dfa6e9bf9d63406e05b6b01135c189242a7c33718c

    • SHA512

      418f56a804212158033b1ae592cafeb8fa1c5a0d9506eb541beb7762c23ebfe5c61dbac8588c350816c229e9f6d77457e361423146874695976c1b8d9267cbff

    • SSDEEP

      24576:ZNAsPMh+Cdd8509puHmATonQ1htKzWbGWO:dPMvA509pkonAhtHbnO

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Loads dropped DLL

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      be2621a78a13a56cf09e00dd98488360

    • SHA1

      75f0539dc6af200a07cdb056cddddec595c6cfd2

    • SHA256

      852047023ba0cae91c7a43365878613cfb4e64e36ff98c460e113d5088d68ef5

    • SHA512

      b80cf1f678e6885276b9a1bfd9227374b2eb9e38bb20446d52ebe2c3dba89764aa50cb4d49df51a974478f3364b5dbcbc5b4a16dc8f1123b40c89c01725be3d1

    • SSDEEP

      192:eB2HS+ihg200uWz947Wzvxu6v0MI7JOde+Ij5Z77dslFsE+:3S62Gw947ExuGDI7J8EF7KIE

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks