General

  • Target

    0839190034df3cc414fa255d2283de3c.bin

  • Size

    549KB

  • Sample

    241118-bc2b8ayram

  • MD5

    831eb1b0d4538ede75868962e1b66050

  • SHA1

    4fe2fa19a8cae8061093a796d454de607e6cc3c3

  • SHA256

    9a0160601325a3f1478b7248d8ba7b49fc90eb36fc518cc07533b49a89dbcae6

  • SHA512

    6be02ba86a58904869338b705ae70fceced46c3afeae60cbc7a2d733898377adf743d138d59179f22322ac3741403f319751b2800dd3585277904059e40fd4dc

  • SSDEEP

    12288:FRCsCe59jgkQCEsET7cvRiPCbz4wMrnQC0AaYUkzos7M2WWCWMwz:FRCsHv12/qZmrLavXxS

Malware Config

Targets

    • Target

      5fa128e617818eb6d70490ee47e4a8369e053fa5f7f7e79b982a120fe5bfe16d.exe

    • Size

      687KB

    • MD5

      0839190034df3cc414fa255d2283de3c

    • SHA1

      ee691b6f85474654165db8ba8bfaee3ba1e536e0

    • SHA256

      5fa128e617818eb6d70490ee47e4a8369e053fa5f7f7e79b982a120fe5bfe16d

    • SHA512

      6f64f51cf8b428959a83e7e2da743faec564d9c71659a51696cea4f9bc5b70fc713a010dcf3d99de47534cabba39e9e9616a34ded6633b891ea7ea7f93127903

    • SSDEEP

      12288:G0mnA1zcV/ErmWHObMmFPOeK5Wia8r9t3DSDb4NP:uA1zcMmJomFPs5We3ew5

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Blocklisted process makes network request

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      Bygsukkerets/Wanderlusts.Uto

    • Size

      52KB

    • MD5

      97c0731e8a832706f3f157e89ce3999b

    • SHA1

      8665ec5d2421bf666bd1bdc2b81876f582aa7a5d

    • SHA256

      e7d18aee03c79a8a55e2f0fc47ad0693c0bd5ba584b879c82624b4c80946b432

    • SHA512

      283ab18b29f488197daaeec4e7ddfc2b707e13c15c308c7f2b3b8bb492833e2a0bff70a5fe4ef5b2cce51830492785fc6c13a1eb69c60db39578dd5a39b78731

    • SSDEEP

      1536:ATz1EnqDuXf0VfLfTxv5P30atVCOKxoSbg5/StPv:ATZEnqDEf0VTfTxx30ecoQeS

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks