General

  • Target

    JaffaCakes118_3488a33e978dbb1cfb03897e5d717a0a116e8ec7aa4c237ae96892081e236c40

  • Size

    91KB

  • Sample

    241229-f1gd6stmek

  • MD5

    151e6b10a9fc5d46ef2fe47db9341299

  • SHA1

    d45038f32b1c203004eb68dbcccb292329707314

  • SHA256

    3488a33e978dbb1cfb03897e5d717a0a116e8ec7aa4c237ae96892081e236c40

  • SHA512

    079660de624f04ce8d33c846e03f79c333adb038f0aacd3a22622d758fbb82ac7d50a6a6d09dfa52b8ce45b29863379b1c846525cdb1bec42edc06f668ed3382

  • SSDEEP

    1536:6i/+uE7ixfTxj7/agTmpC5+MkpMBoCROhmIKyjr18mYFmSbm7wYsdtcwGLZXnzcP:vGB7ilT1/hoFpcRIKyP18mEbwaVihnzG

Malware Config

Targets

    • Target

      JaffaCakes118_3488a33e978dbb1cfb03897e5d717a0a116e8ec7aa4c237ae96892081e236c40

    • Size

      91KB

    • MD5

      151e6b10a9fc5d46ef2fe47db9341299

    • SHA1

      d45038f32b1c203004eb68dbcccb292329707314

    • SHA256

      3488a33e978dbb1cfb03897e5d717a0a116e8ec7aa4c237ae96892081e236c40

    • SHA512

      079660de624f04ce8d33c846e03f79c333adb038f0aacd3a22622d758fbb82ac7d50a6a6d09dfa52b8ce45b29863379b1c846525cdb1bec42edc06f668ed3382

    • SSDEEP

      1536:6i/+uE7ixfTxj7/agTmpC5+MkpMBoCROhmIKyjr18mYFmSbm7wYsdtcwGLZXnzcP:vGB7ilT1/hoFpcRIKyP18mEbwaVihnzG

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Checks QEMU agent file

      Checks presence of QEMU agent, possibly to detect virtualization.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks