General

  • Target

    5a5fe86d32660877662cd4bc0916e87c_JaffaCakes118

  • Size

    172KB

  • Sample

    240519-t4n53sff72

  • MD5

    5a5fe86d32660877662cd4bc0916e87c

  • SHA1

    feb13462ea4bca01318b49fe8e00532b3cae39c9

  • SHA256

    a88b3765265ed52ebaee7dbf55b41744c509cfc8a5fe18e1d443a46e199935a6

  • SHA512

    62dea3c54ecef4eb1c200b0cc538e4715c2e70781c87d11a0a256b3ae81c531b6a1b6bdd4f9a634b8ab3decff0c848177b964d34cb7fae2b398c14ff63e69215

  • SSDEEP

    1536:IOvr/4Dz5/HILz2uaPokkeaH1F8fZ/t1HXff1F/5/HILz2uaPokkeapD8/gv:H/41HY2uaPoMcSLL9HY2uaPoM0w/

Malware Config

Extracted

Family

guloader

C2

https://drive.google.com/uc?export=download&id=15ra3TwERA8gReH3xRZ3zJe1fcJQfkUpG

xor.base64

Targets

    • Target

      5a5fe86d32660877662cd4bc0916e87c_JaffaCakes118

    • Size

      172KB

    • MD5

      5a5fe86d32660877662cd4bc0916e87c

    • SHA1

      feb13462ea4bca01318b49fe8e00532b3cae39c9

    • SHA256

      a88b3765265ed52ebaee7dbf55b41744c509cfc8a5fe18e1d443a46e199935a6

    • SHA512

      62dea3c54ecef4eb1c200b0cc538e4715c2e70781c87d11a0a256b3ae81c531b6a1b6bdd4f9a634b8ab3decff0c848177b964d34cb7fae2b398c14ff63e69215

    • SSDEEP

      1536:IOvr/4Dz5/HILz2uaPokkeaH1F8fZ/t1HXff1F/5/HILz2uaPokkeapD8/gv:H/41HY2uaPoMcSLL9HY2uaPoM0w/

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Guloader payload

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Command and Control

Web Service

1
T1102

Tasks