General

  • Target

    9c9ac5aaddd8c4e34dcc7ef71fdab160e072cf1e14e91be9378bd9968931a1e2.exe

  • Size

    523KB

  • Sample

    241231-1cvxwaspdn

  • MD5

    6193601803552ff86919a43e0cf2b9ee

  • SHA1

    e05fcd72c26c1fb659fc9c1488887d7e06847fe5

  • SHA256

    9c9ac5aaddd8c4e34dcc7ef71fdab160e072cf1e14e91be9378bd9968931a1e2

  • SHA512

    9f3ff9950edcf20c994c8d3e8e58fbd39251456ac12164b012e47fc2645fdc17dd8ecdb737b8430def7d43649a93066de6750bd5ac578206a30232696f2751ea

  • SSDEEP

    12288:IV62a2glYb8wUGif7N0VNmq4xYoST/Uz6WouzJ:Io2aJOAwUGmCVNX4Go6WoWJ

Malware Config

Targets

    • Target

      9c9ac5aaddd8c4e34dcc7ef71fdab160e072cf1e14e91be9378bd9968931a1e2.exe

    • Size

      523KB

    • MD5

      6193601803552ff86919a43e0cf2b9ee

    • SHA1

      e05fcd72c26c1fb659fc9c1488887d7e06847fe5

    • SHA256

      9c9ac5aaddd8c4e34dcc7ef71fdab160e072cf1e14e91be9378bd9968931a1e2

    • SHA512

      9f3ff9950edcf20c994c8d3e8e58fbd39251456ac12164b012e47fc2645fdc17dd8ecdb737b8430def7d43649a93066de6750bd5ac578206a30232696f2751ea

    • SSDEEP

      12288:IV62a2glYb8wUGif7N0VNmq4xYoST/Uz6WouzJ:Io2aJOAwUGmCVNX4Go6WoWJ

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      12KB

    • MD5

      0d7ad4f45dc6f5aa87f606d0331c6901

    • SHA1

      48df0911f0484cbe2a8cdd5362140b63c41ee457

    • SHA256

      3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca

    • SHA512

      c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

    • SSDEEP

      192:1enY0LWelt70elWjvfstJcVtwtYbjnIOg5AaDnbC7ypXhtIj:18PJlt70esj0Mt9vn6ay6

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks