GuLoader
Techniques Used |
||||
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols |
GuLoader can use HTTP to retrieve additional binaries.(Citation: Unit 42 NETWIRE April 2020)(Citation: Medium Eli Salem GuLoader April 2021) |
Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
GuLoader can establish persistence via the Registry under |
Enterprise | T1070 | .004 | Indicator Removal: File Deletion |
GuLoader can delete its executable from the |
Enterprise | T1566 | .002 | Phishing: Spearphishing Link |
GuLoader has been spread in phishing campaigns using malicious web links.(Citation: Unit 42 NETWIRE April 2020) |
Enterprise | T1204 | .001 | User Execution: Malicious Link |
GuLoader has relied upon users clicking on links to malicious documents.(Citation: Unit 42 NETWIRE April 2020) |
.002 | User Execution: Malicious File |
The GuLoader executable has been retrieved via embedded macros in malicious Word documents.(Citation: Unit 42 NETWIRE April 2020) |
||
Enterprise | T1497 | .001 | Virtualization/Sandbox Evasion: System Checks |
GuLoader has the ability to perform anti-VM and anti-sandbox checks using string hashing, the API call |
.003 | Virtualization/Sandbox Evasion: Time Based Evasion |
GuLoader has the ability to perform anti-debugging based on time checks, API calls, and CPUID.(Citation: Medium Eli Salem GuLoader April 2021) |
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.