General

  • Target

    Welfab%20Engineering%20Works%20Sdn%20Bhd%20%28605812-D%29.zip

  • Size

    502KB

  • Sample

    241127-kzfhpstlfm

  • MD5

    ce2ad77d561441eba07723e8b91fe46a

  • SHA1

    615a8b0a351db8d1188c29fa84b7230baddd3646

  • SHA256

    1e3400269bb6d96dd3029758c87bf265fc9b45eb91446da8eb1ee591a9bb2a7b

  • SHA512

    0b969c161a943426de284605f78d8b5c7c32f6eeec318417397a30de761c0c9f5605a3151195bc10292dbe05febddf00e814e85952e6fb005cabd07f8c9b7f12

  • SSDEEP

    12288:ga9wb2sRWwxk+bC5h3Im1BvtI3MJeTEbU+JN0:wxWwxFbm3ImdI36egbU+0

Malware Config

Targets

    • Target

      Welfab%20Engineering%20Works%20Sdn%20Bhd%20%28605812-D%29.zip

    • Size

      502KB

    • MD5

      ce2ad77d561441eba07723e8b91fe46a

    • SHA1

      615a8b0a351db8d1188c29fa84b7230baddd3646

    • SHA256

      1e3400269bb6d96dd3029758c87bf265fc9b45eb91446da8eb1ee591a9bb2a7b

    • SHA512

      0b969c161a943426de284605f78d8b5c7c32f6eeec318417397a30de761c0c9f5605a3151195bc10292dbe05febddf00e814e85952e6fb005cabd07f8c9b7f12

    • SSDEEP

      12288:ga9wb2sRWwxk+bC5h3Im1BvtI3MJeTEbU+JN0:wxWwxFbm3ImdI36egbU+0

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks