General
-
Target
JaffaCakes118_8c00c454e6ad4bd1f3da75c64bbfbec9e5d1c60f8d1261d3416092a5286244b7
-
Size
485KB
-
Sample
241229-n6efrs1lf1
-
MD5
935991d96b89502a4f8a0f30840fa2c0
-
SHA1
67e4f358023aa8d9b0b78a40814b20dd87e29960
-
SHA256
8c00c454e6ad4bd1f3da75c64bbfbec9e5d1c60f8d1261d3416092a5286244b7
-
SHA512
dbdfac9569f625a550635a689211144cf4c266592ac91f8e8f78dbc216dd449634095a68bd9736a799cd99c58b0a6005c7379a9dc4eb66b26a5a5d33fee27780
-
SSDEEP
12288:L0Fh6RXy4b9zveX3ZAQF+ru+IUQxLqycHk7Xs:Mhi5zU3ZAQF+kLNwHk78
Static task
static1
Behavioral task
behavioral1
Sample
JULSA 2210229506A.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JULSA 2210229506A.vbs
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JULSA 2210229506A.vbs
-
Size
733KB
-
MD5
aec804daef54d95f792c3f15412535ea
-
SHA1
caefec8e0f73270559edbf714fbb703f100a02b1
-
SHA256
eb2a3f6ebe19514c6f1f7795eb65b4e3d2c0584ad754b06ad89ce6b4d247770f
-
SHA512
8c6420299ded52dfad338ed391ae16b13b1ac8bcb8f9482fc99e6916a9b8ae3c8dd7eadb8076d8770172369526f6ba11f87f94d72d779d7d157e7818136f3a5f
-
SSDEEP
12288:UoC/EqeqN8AmHXmXt7QUu38zUL9ZaYTTr8DDdSfLmXe3l6GLOYv0Z:PCHGXm97zvUL9LOg6O3YYvy
Score10/10-
Guloader family
-
Blocklisted process makes network request
-
Checks QEMU agent file
Checks presence of QEMU agent, possibly to detect virtualization.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-