General

  • Target

    71c06e318241522ac21375788b946b0f035226c53fa88c7abd53a6a9c42a0b1aN.exe

  • Size

    523KB

  • Sample

    241231-rks9kstpcx

  • MD5

    cd4f5f92ef04d249e8471549c4ba3250

  • SHA1

    35188c3be48f92271e796acc41587b08cb9a1dd5

  • SHA256

    71c06e318241522ac21375788b946b0f035226c53fa88c7abd53a6a9c42a0b1a

  • SHA512

    2f3a93bf79eb60628746eab2b94a16592db0b5392c8b8eddeca07ede5c41a5fdfe9910a80633cfef71e6c0cf6fa2f36cef40a3ff611e7e9095d3bf39a276d326

  • SSDEEP

    12288:IV62a2glYb8wUGif7N0VNmq4xYoST/Uz6WouzZ:Io2aJOAwUGmCVNX4Go6WoWZ

Malware Config

Targets

    • Target

      71c06e318241522ac21375788b946b0f035226c53fa88c7abd53a6a9c42a0b1aN.exe

    • Size

      523KB

    • MD5

      cd4f5f92ef04d249e8471549c4ba3250

    • SHA1

      35188c3be48f92271e796acc41587b08cb9a1dd5

    • SHA256

      71c06e318241522ac21375788b946b0f035226c53fa88c7abd53a6a9c42a0b1a

    • SHA512

      2f3a93bf79eb60628746eab2b94a16592db0b5392c8b8eddeca07ede5c41a5fdfe9910a80633cfef71e6c0cf6fa2f36cef40a3ff611e7e9095d3bf39a276d326

    • SSDEEP

      12288:IV62a2glYb8wUGif7N0VNmq4xYoST/Uz6WouzZ:Io2aJOAwUGmCVNX4Go6WoWZ

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      12KB

    • MD5

      0d7ad4f45dc6f5aa87f606d0331c6901

    • SHA1

      48df0911f0484cbe2a8cdd5362140b63c41ee457

    • SHA256

      3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca

    • SHA512

      c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

    • SSDEEP

      192:1enY0LWelt70elWjvfstJcVtwtYbjnIOg5AaDnbC7ypXhtIj:18PJlt70esj0Mt9vn6ay6

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks