General

  • Target

    Factura 9000012567.exe

  • Size

    419KB

  • Sample

    241202-qex5xavlcv

  • MD5

    1194e870e252e43b41cc724c1c7a987e

  • SHA1

    e7a95416ebc253d9fe01fb3c90c6fa713143436d

  • SHA256

    e284501ae59fcc3f04a7494637a3ae8ff5bb223e333f7c25cbedd322893d5367

  • SHA512

    d88e334a88740a5d71666757bc5309414deefe82c4bd601ea9d7dec1fc54cead898f750215028fef8026b7a948a7f184e4b06a0c9eb6e99e0ad55b014733b101

  • SSDEEP

    12288:bch7SSzvYNxbs0V0utVFWN5yUBHWpwyx9fag6vI:bqvv2Vx0urqwg4xyrvI

Malware Config

Targets

    • Target

      Factura 9000012567.exe

    • Size

      419KB

    • MD5

      1194e870e252e43b41cc724c1c7a987e

    • SHA1

      e7a95416ebc253d9fe01fb3c90c6fa713143436d

    • SHA256

      e284501ae59fcc3f04a7494637a3ae8ff5bb223e333f7c25cbedd322893d5367

    • SHA512

      d88e334a88740a5d71666757bc5309414deefe82c4bd601ea9d7dec1fc54cead898f750215028fef8026b7a948a7f184e4b06a0c9eb6e99e0ad55b014733b101

    • SSDEEP

      12288:bch7SSzvYNxbs0V0utVFWN5yUBHWpwyx9fag6vI:bqvv2Vx0urqwg4xyrvI

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      17ed1c86bd67e78ade4712be48a7d2bd

    • SHA1

      1cc9fe86d6d6030b4dae45ecddce5907991c01a0

    • SHA256

      bd046e6497b304e4ea4ab102cab2b1f94ce09bde0eebba4c59942a732679e4eb

    • SHA512

      0cbed521e7d6d1f85977b3f7d3ca7ac34e1b5495b69fd8c7bfa1a846baf53b0ecd06fe1ad02a3599082ffacaf8c71a3bb4e32dec05f8e24859d736b828092cd5

    • SSDEEP

      192:eY24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35Ol+Sl:E8QIl975eXqlWBrz7YLOl+

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks