General

  • Target

    7e7fabb1faa04e24a0c3471c60203ec7_JaffaCakes118

  • Size

    76KB

  • Sample

    240528-1k2qdseg39

  • MD5

    7e7fabb1faa04e24a0c3471c60203ec7

  • SHA1

    eba626b2199a3fc7256bf09dba9a72ad2b277959

  • SHA256

    6d6e36eaf29e38080d45637d42af428e2cccb9b7e47129c6c70ae84dc7db6489

  • SHA512

    f2576f40214f24f983c9675dd52f1451976fc602c195db6d84f33fb5ee30e5835c740af65194b7600b89f96950f9efe79933498dd1487d29bb9a5ff0fa6fbeb4

  • SSDEEP

    1536:p4/YORBpLjjoSXffIVA7Z130GAlG/YORBpLjjoSXff:CQORjjoSYVA7zkGAlGQORjjoS

Malware Config

Extracted

Family

guloader

C2

https://drive.google.com/uc?export=download&id=14fiYTuh9XFnx8VPpsFqaVqLQKYS82Ur5

xor.base64

Targets

    • Target

      7e7fabb1faa04e24a0c3471c60203ec7_JaffaCakes118

    • Size

      76KB

    • MD5

      7e7fabb1faa04e24a0c3471c60203ec7

    • SHA1

      eba626b2199a3fc7256bf09dba9a72ad2b277959

    • SHA256

      6d6e36eaf29e38080d45637d42af428e2cccb9b7e47129c6c70ae84dc7db6489

    • SHA512

      f2576f40214f24f983c9675dd52f1451976fc602c195db6d84f33fb5ee30e5835c740af65194b7600b89f96950f9efe79933498dd1487d29bb9a5ff0fa6fbeb4

    • SSDEEP

      1536:p4/YORBpLjjoSXffIVA7Z130GAlG/YORBpLjjoSXff:CQORjjoSYVA7zkGAlGQORjjoS

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Guloader payload

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Command and Control

Web Service

1
T1102

Tasks