General

  • Target

    PAGO.cmd

  • Size

    959KB

  • Sample

    250214-m989wavjet

  • MD5

    b7819321f80217a516dc2649097a6cc4

  • SHA1

    c35be052ffa3ad243512cafee4034656399f52cd

  • SHA256

    77e15415d2427d168202684e80034c83d83230deee10efe86cf07049af98d77c

  • SHA512

    8fd59280dd6658b6b105936eda91555e6c1f7c0f6b7aebfe3df7c74a6b94db2498acc36d896e31d9de63c8d0073fb25127c249d1c9ca15ba09127f83cb6a6525

  • SSDEEP

    12288:UPCl0t4TkEIroYUI2K/AtBb2d/fNguvEc4sI20geXazMbkJ/i3O2CHaAUwvUbcYG:UKRfcOe4hDgeqzRJ/LLU6WcbTtUi

Malware Config

Targets

    • Target

      PAGO.cmd

    • Size

      959KB

    • MD5

      b7819321f80217a516dc2649097a6cc4

    • SHA1

      c35be052ffa3ad243512cafee4034656399f52cd

    • SHA256

      77e15415d2427d168202684e80034c83d83230deee10efe86cf07049af98d77c

    • SHA512

      8fd59280dd6658b6b105936eda91555e6c1f7c0f6b7aebfe3df7c74a6b94db2498acc36d896e31d9de63c8d0073fb25127c249d1c9ca15ba09127f83cb6a6525

    • SSDEEP

      12288:UPCl0t4TkEIroYUI2K/AtBb2d/fNguvEc4sI20geXazMbkJ/i3O2CHaAUwvUbcYG:UKRfcOe4hDgeqzRJ/LLU6WcbTtUi

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks