General

  • Target

    app.exe

  • Size

    3.7MB

  • Sample

    201017-fhe81yfg22

  • MD5

    668aa92e65133ae444a91f3246a8b25f

  • SHA1

    ef196259a3c3c563103e09c65e4ab8bb7c6a1e3c

  • SHA256

    482027d0e151826c175ff084f6e76ce4ca3a920ca648fc2d5906ed0a793fe8ad

  • SHA512

    c8d35a7ac7e0ebbd9a0b2486e473b7001173ef7f21e449eb25b9591924d9f6dbdabd138016afca0192ad832e04d1e52bd82126cac3ed77ed9f1df44edf705393

Malware Config

Targets

    • Target

      app.exe

    • Size

      3.7MB

    • MD5

      668aa92e65133ae444a91f3246a8b25f

    • SHA1

      ef196259a3c3c563103e09c65e4ab8bb7c6a1e3c

    • SHA256

      482027d0e151826c175ff084f6e76ce4ca3a920ca648fc2d5906ed0a793fe8ad

    • SHA512

      c8d35a7ac7e0ebbd9a0b2486e473b7001173ef7f21e449eb25b9591924d9f6dbdabd138016afca0192ad832e04d1e52bd82126cac3ed77ed9f1df44edf705393

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba Payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks