General

  • Target

    164f6ad21e14ac4166a6fc80719fd681eb66cd6bcaff3e683fc7c5391be35729.exe

  • Size

    861KB

  • Sample

    250205-dy4etaxjey

  • MD5

    b062dbccf2a25f8a5a029fdc818ff871

  • SHA1

    420b7a11723cf2baa977be0c37ccfa4ee1c55c9c

  • SHA256

    164f6ad21e14ac4166a6fc80719fd681eb66cd6bcaff3e683fc7c5391be35729

  • SHA512

    32f0bcf8077c119d73b27be16049b8f0dccdbf3cf160c7782df218c761475bc3f31c0f6f47a76b9c467334d4dd704320e16c0e930ee0d3544aa307858a8b6199

  • SSDEEP

    24576:QPyqE0GP4TDRiB9P+/c0P3j/kSQ7KHuReqr/sblNP9Ex5:IE0K330j/usWp/sblNVE7

Malware Config

Targets

    • Target

      164f6ad21e14ac4166a6fc80719fd681eb66cd6bcaff3e683fc7c5391be35729.exe

    • Size

      861KB

    • MD5

      b062dbccf2a25f8a5a029fdc818ff871

    • SHA1

      420b7a11723cf2baa977be0c37ccfa4ee1c55c9c

    • SHA256

      164f6ad21e14ac4166a6fc80719fd681eb66cd6bcaff3e683fc7c5391be35729

    • SHA512

      32f0bcf8077c119d73b27be16049b8f0dccdbf3cf160c7782df218c761475bc3f31c0f6f47a76b9c467334d4dd704320e16c0e930ee0d3544aa307858a8b6199

    • SSDEEP

      24576:QPyqE0GP4TDRiB9P+/c0P3j/kSQ7KHuReqr/sblNP9Ex5:IE0K330j/usWp/sblNVE7

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Modifies Windows Defender DisableAntiSpyware settings

    • Disables Task Manager via registry modification

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      a4dd044bcd94e9b3370ccf095b31f896

    • SHA1

      17c78201323ab2095bc53184aa8267c9187d5173

    • SHA256

      2e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc

    • SHA512

      87335a43b9ca13e1300c7c23e702e87c669e2bcf4f6065f0c684fc53165e9c1f091cc4d79a3eca3910f0518d3b647120ac0be1a68eaade2e75eaa64adfc92c5a

    • SSDEEP

      192:em24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35OlESl:m8QIl975eXqlWBrz7YLOlE

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks