General

  • Target

    53a703b29d5aebc4a0b5794d0904e49aa90d72525018df4f9121e5da86116534.exe

  • Size

    694KB

  • Sample

    241114-cw1qgatbpb

  • MD5

    74f8407f98ac51a0b9feb8782bd8f7c9

  • SHA1

    d49d93ac8941442fe52eda4b1240f3afd620bb08

  • SHA256

    53a703b29d5aebc4a0b5794d0904e49aa90d72525018df4f9121e5da86116534

  • SHA512

    9ee6d913eeabc524e2f271b87e7df993adeb886299ec12ceb81790355d234439fac5ab2c98f6cbcca6742bcb0abe3fd603add6bcdd17ea0bf8ebdda12c6aa790

  • SSDEEP

    12288:xXFAO0Qb6xMem7HGKCdt44epEx3linXjVdiyqkkHnZ4CCVjscJ4nX0q2mY9+QQhX:xXFN0Yem7Q3yOx3gnXRdiZ9HkV+nX0qj

Malware Config

Targets

    • Target

      53a703b29d5aebc4a0b5794d0904e49aa90d72525018df4f9121e5da86116534.exe

    • Size

      694KB

    • MD5

      74f8407f98ac51a0b9feb8782bd8f7c9

    • SHA1

      d49d93ac8941442fe52eda4b1240f3afd620bb08

    • SHA256

      53a703b29d5aebc4a0b5794d0904e49aa90d72525018df4f9121e5da86116534

    • SHA512

      9ee6d913eeabc524e2f271b87e7df993adeb886299ec12ceb81790355d234439fac5ab2c98f6cbcca6742bcb0abe3fd603add6bcdd17ea0bf8ebdda12c6aa790

    • SSDEEP

      12288:xXFAO0Qb6xMem7HGKCdt44epEx3linXjVdiyqkkHnZ4CCVjscJ4nX0q2mY9+QQhX:xXFN0Yem7Q3yOx3gnXRdiZ9HkV+nX0qj

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      12KB

    • MD5

      4add245d4ba34b04f213409bfe504c07

    • SHA1

      ef756d6581d70e87d58cc4982e3f4d18e0ea5b09

    • SHA256

      9111099efe9d5c9b391dc132b2faf0a3851a760d4106d5368e30ac744eb42706

    • SHA512

      1bd260cabe5ea3cefbbc675162f30092ab157893510f45a1b571489e03ebb2903c55f64f89812754d3fe03c8f10012b8078d1261a7e73ac1f87c82f714bce03d

    • SSDEEP

      192:VjHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZv0QPi:B/Qlt7wiij/lMRv/9V4bvr

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks