General

  • Target

    6f45bd0535f4654ea024f6336cdeecbc44272c903353963a7d7a0f8d8e74a51e.exe

  • Size

    990KB

  • Sample

    241211-c88a3ssmgy

  • MD5

    38499dde4bd6169ef983fc23eebc2642

  • SHA1

    80c78c8f8b498528b4aae2b569a5656b17d98993

  • SHA256

    6f45bd0535f4654ea024f6336cdeecbc44272c903353963a7d7a0f8d8e74a51e

  • SHA512

    ac9f03ce93401afc992fdfa7cf06a949539ed96abd8d0844b8a1c7acbc43c70e1976c3762d755ef8b69b67440c7b256b82a8f117723e07401e3e84efb61ce346

  • SSDEEP

    24576:9jwKCN1tSd7mEf4nPTlLUIJ2IAdQquWVbs2XpvAv:V1C3ocEMrl+IQQq5xs2Cv

Malware Config

Targets

    • Target

      6f45bd0535f4654ea024f6336cdeecbc44272c903353963a7d7a0f8d8e74a51e.exe

    • Size

      990KB

    • MD5

      38499dde4bd6169ef983fc23eebc2642

    • SHA1

      80c78c8f8b498528b4aae2b569a5656b17d98993

    • SHA256

      6f45bd0535f4654ea024f6336cdeecbc44272c903353963a7d7a0f8d8e74a51e

    • SHA512

      ac9f03ce93401afc992fdfa7cf06a949539ed96abd8d0844b8a1c7acbc43c70e1976c3762d755ef8b69b67440c7b256b82a8f117723e07401e3e84efb61ce346

    • SSDEEP

      24576:9jwKCN1tSd7mEf4nPTlLUIJ2IAdQquWVbs2XpvAv:V1C3ocEMrl+IQQq5xs2Cv

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      12KB

    • MD5

      0d7ad4f45dc6f5aa87f606d0331c6901

    • SHA1

      48df0911f0484cbe2a8cdd5362140b63c41ee457

    • SHA256

      3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca

    • SHA512

      c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

    • SSDEEP

      192:1enY0LWelt70elWjvfstJcVtwtYbjnIOg5AaDnbC7ypXhtIj:18PJlt70esj0Mt9vn6ay6

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks