General

  • Target

    d07eb1cca55b5195006a27d2404c3a7c946eddd5a696d1927e37127083abb143

  • Size

    95KB

  • Sample

    240705-dme8va1epj

  • MD5

    862e44eacdd56c24aa604045e91af3f6

  • SHA1

    da539efe3591ffc8c97280b602919232f626624a

  • SHA256

    d07eb1cca55b5195006a27d2404c3a7c946eddd5a696d1927e37127083abb143

  • SHA512

    a7ca96556d30fb9aebbba635fd075bb1687335073334abe140075dde00ebdbd6c3e07f1ed719641dfa7e2780a3c252b7af60fa0576a6e94934a511543b773699

  • SSDEEP

    768:IS8IpHdEtdm364D191lqnAfXz7tzykuKGqv3Msq/rz:vpMY37D191JfD7t+kuKGqUJz

Score
10/10

Malware Config

Extracted

Family

guloader

C2

https://drive.google.com/uc?export=download&id=1YBoLSiQywpFWRLmg4jO1ZmxoLr9XCFgI

xor.base64

Targets

    • Target

      d07eb1cca55b5195006a27d2404c3a7c946eddd5a696d1927e37127083abb143

    • Size

      95KB

    • MD5

      862e44eacdd56c24aa604045e91af3f6

    • SHA1

      da539efe3591ffc8c97280b602919232f626624a

    • SHA256

      d07eb1cca55b5195006a27d2404c3a7c946eddd5a696d1927e37127083abb143

    • SHA512

      a7ca96556d30fb9aebbba635fd075bb1687335073334abe140075dde00ebdbd6c3e07f1ed719641dfa7e2780a3c252b7af60fa0576a6e94934a511543b773699

    • SSDEEP

      768:IS8IpHdEtdm364D191lqnAfXz7tzykuKGqv3Msq/rz:vpMY37D191JfD7t+kuKGqUJz

    Score
    10/10
    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Checks QEMU agent state file

      Checks state file used by QEMU agent, possibly to detect virtualization.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

1
T1012

Virtualization/Sandbox Evasion

1
T1497

Tasks