General

  • Target

    32ffd8afdab0aa8813b29251b39f3d010e4a1d2d1eca19e9b8825190ea3c4d1b

  • Size

    3.9MB

  • Sample

    220509-ax6xrsbge9

  • MD5

    5f844e9f04b1f6265b891f1a9144c6b4

  • SHA1

    6e31e59c7e911959886c89c0303ca6c79e96bafa

  • SHA256

    32ffd8afdab0aa8813b29251b39f3d010e4a1d2d1eca19e9b8825190ea3c4d1b

  • SHA512

    e91a06316617dbcf74cc2c80ba66d8655b34e53390b56b4275b9db1295fa855a1a9b8d5c46c0b19d7d45eb5ce656c8d38c690cfee3db1009a1a4d8ec4ed2c878

Malware Config

Targets

    • Target

      32ffd8afdab0aa8813b29251b39f3d010e4a1d2d1eca19e9b8825190ea3c4d1b

    • Size

      3.9MB

    • MD5

      5f844e9f04b1f6265b891f1a9144c6b4

    • SHA1

      6e31e59c7e911959886c89c0303ca6c79e96bafa

    • SHA256

      32ffd8afdab0aa8813b29251b39f3d010e4a1d2d1eca19e9b8825190ea3c4d1b

    • SHA512

      e91a06316617dbcf74cc2c80ba66d8655b34e53390b56b4275b9db1295fa855a1a9b8d5c46c0b19d7d45eb5ce656c8d38c690cfee3db1009a1a4d8ec4ed2c878

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba Payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Modifies boot configuration data using bcdedit

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Impair Defenses

1
T1562

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Tasks