General
-
Target
34125118c603cbb2c4f6e6362e28ab2b8162de4eadf86dcda60c9df74b8be350
-
Size
63KB
-
Sample
241121-zjec2axmgy
-
MD5
fa98294c58c04f97fac6d9f0f03616f9
-
SHA1
7e3b737f8a6d40828906b22ba89c1f47348d6b0a
-
SHA256
34125118c603cbb2c4f6e6362e28ab2b8162de4eadf86dcda60c9df74b8be350
-
SHA512
18d47c014964c3996f220ae6ce234f54af018f13ef17697b496ffd614f59a460facc70470865a125049294240aa34bedb61241861bf109aac237725750a62ee8
-
SSDEEP
1536:vquBWo4hSK4R9AwSbtqr+7FW1GO7GYGSTl34PbruPnNnr2L8GaJud:8hSRAzbtqr+xqTTloDruVnr2xku
Static task
static1
Behavioral task
behavioral1
Sample
d032bf21aa1029b3d49763fd303dd84ad36c303a07ea1293e039bc8c35c0e1e7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d032bf21aa1029b3d49763fd303dd84ad36c303a07ea1293e039bc8c35c0e1e7.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
guloader
http://45.85.90.226/kt.bin
Targets
-
-
Target
d032bf21aa1029b3d49763fd303dd84ad36c303a07ea1293e039bc8c35c0e1e7
-
Size
164KB
-
MD5
0040a650409cbf4a64597ee1f64b874f
-
SHA1
3a54dce238334d6d59ba7a796a43e86c917478a8
-
SHA256
d032bf21aa1029b3d49763fd303dd84ad36c303a07ea1293e039bc8c35c0e1e7
-
SHA512
e54cfb9af724864753a8a6eede4b1ffa5b1e95e8082d5c306f6ad16342af2e48bcb4bf6b137ca43407970cb18ebab16580eeeaf50d425d06fe40e761d93dda49
-
SSDEEP
3072:etOcNsL93qdY0F51nCyBQifSgwKAs/RF53IyVx1rm7gwc3yGChGZrjFZxFsKdxw6:eUV0rC3i6gys/RF53IyVx1rm7gwc3yG3
Score10/10-
Guloader family
-
Checks QEMU agent file
Checks presence of QEMU agent, possibly to detect virtualization.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-