General

  • Target

    1.exe

  • Size

    853KB

  • Sample

    250205-t5jxrawqhl

  • MD5

    8034e8c87b2540fd486dd168625686c2

  • SHA1

    5c8172e11d98170207755021d742b90e0a2bdf26

  • SHA256

    5449a2565dcad9001a0bfddd75bf558a0e57f0ea91916a8708455eacb57bac62

  • SHA512

    9cc2edc752b1ca0b450a0724f23f7c7cd39dcb07e414532ada1387e00c134625156ee0b8b0c7e09f019d16de24a10330bca81f618fdb96ae3a715c93a5a3873c

  • SSDEEP

    24576:Q4nbY9dZZZZZZZZZZy5dIg3nMKlCIO4vvV3HQmhQ436/zF:Q+qZZZZZZZZZZ8l3Mmhvv1wzq6J

Malware Config

Targets

    • Target

      1.exe

    • Size

      853KB

    • MD5

      8034e8c87b2540fd486dd168625686c2

    • SHA1

      5c8172e11d98170207755021d742b90e0a2bdf26

    • SHA256

      5449a2565dcad9001a0bfddd75bf558a0e57f0ea91916a8708455eacb57bac62

    • SHA512

      9cc2edc752b1ca0b450a0724f23f7c7cd39dcb07e414532ada1387e00c134625156ee0b8b0c7e09f019d16de24a10330bca81f618fdb96ae3a715c93a5a3873c

    • SSDEEP

      24576:Q4nbY9dZZZZZZZZZZy5dIg3nMKlCIO4vvV3HQmhQ436/zF:Q+qZZZZZZZZZZ8l3Mmhvv1wzq6J

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      $PLUGINSDIR/System.dll

    • Size

      12KB

    • MD5

      d6f54d2cefdf58836805796f55bfc846

    • SHA1

      b980addc1a755b968dd5799179d3b4f1c2de9d2d

    • SHA256

      f917aef484d1fbb4d723b2e2d3045cb6f5f664e61fbb3d5c577bd1c215de55d9

    • SHA512

      ce67da936a93d46ef7e81abc8276787c82fd844c03630ba18afc3528c7e420c3228bfe82aeda083bb719f2d1314afae913362abd1e220cb364606519690d45db

    • SSDEEP

      192:acA1YOTDExj7EFrYCT4E8y3hoSdtTgwF43E7QbGPXI9uIc6w79Mw:RR7SrtTv53tdtTgwF4SQbGPX36wJMw

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks