General

  • Target

    e721cfa7c653086d836c6532c825ef23.bin

  • Size

    736KB

  • Sample

    241108-caabdsserr

  • MD5

    745a9fc4426430aaea09c6aa07bb03cf

  • SHA1

    28652fc1a20122abefebee4a16d220d43b00fa24

  • SHA256

    0faa4fbf5739c26210d53eb047808c8b7f21e16f74d917ccd4361148436b3929

  • SHA512

    dca92d120c772eefeec2d56756e342e102a01a0b5ae126c4ac0c2720378193a974fc39dd623de07591460071c9fa8eec3623f788267b7b186b9d4c0f254ae32a

  • SSDEEP

    12288:rkh9dOo1k8x4oRCTUcToxsADva3XY1wn/MDuXz0sXjgLaIj2xMbIx1YjsgoGXqfY:rkh9dx+vtIcMDL6f4szgLaIhUaePXWu8

Malware Config

Targets

    • Target

      Letter of Intent (LOI) For the Company November 2024 PDF.pif

    • Size

      851KB

    • MD5

      629be165860d2336755de85467756639

    • SHA1

      af1da57d01a00bf942e127cce60fb4208bfd9795

    • SHA256

      e9617a78c93e6d5cdc1087dfa6e9bf9d63406e05b6b01135c189242a7c33718c

    • SHA512

      418f56a804212158033b1ae592cafeb8fa1c5a0d9506eb541beb7762c23ebfe5c61dbac8588c350816c229e9f6d77457e361423146874695976c1b8d9267cbff

    • SSDEEP

      24576:ZNAsPMh+Cdd8509puHmATonQ1htKzWbGWO:dPMvA509pkonAhtHbnO

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Loads dropped DLL

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      be2621a78a13a56cf09e00dd98488360

    • SHA1

      75f0539dc6af200a07cdb056cddddec595c6cfd2

    • SHA256

      852047023ba0cae91c7a43365878613cfb4e64e36ff98c460e113d5088d68ef5

    • SHA512

      b80cf1f678e6885276b9a1bfd9227374b2eb9e38bb20446d52ebe2c3dba89764aa50cb4d49df51a974478f3364b5dbcbc5b4a16dc8f1123b40c89c01725be3d1

    • SSDEEP

      192:eB2HS+ihg200uWz947Wzvxu6v0MI7JOde+Ij5Z77dslFsE+:3S62Gw947ExuGDI7J8EF7KIE

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks