General

  • Target

    92d77c1389c4d81bca7ede850a006433345c79a1b507893e8b22b118182bed6f

  • Size

    5.0MB

  • Sample

    220516-ca4j8sbghl

  • MD5

    c8e116a5ef1b4ccca2114e8731f006d6

  • SHA1

    d3d8a7c603ce30821db8eed6745d92aefd7db98b

  • SHA256

    92d77c1389c4d81bca7ede850a006433345c79a1b507893e8b22b118182bed6f

  • SHA512

    05d0ce58b184781aed85714871c1e7692afe5223487d939d70a220a94ed815f781df90f43f1b65734ab6d6c064f3d5574d5971340cb905b05bb515c7e7d7d48c

Malware Config

Targets

    • Target

      92d77c1389c4d81bca7ede850a006433345c79a1b507893e8b22b118182bed6f

    • Size

      5.0MB

    • MD5

      c8e116a5ef1b4ccca2114e8731f006d6

    • SHA1

      d3d8a7c603ce30821db8eed6745d92aefd7db98b

    • SHA256

      92d77c1389c4d81bca7ede850a006433345c79a1b507893e8b22b118182bed6f

    • SHA512

      05d0ce58b184781aed85714871c1e7692afe5223487d939d70a220a94ed815f781df90f43f1b65734ab6d6c064f3d5574d5971340cb905b05bb515c7e7d7d48c

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba Payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Windows security bypass

    • suricata: ET MALWARE Glupteba CnC Domain in DNS Lookup

      suricata: ET MALWARE Glupteba CnC Domain in DNS Lookup

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Disabling Security Tools

2
T1089

Modify Registry

4
T1112

Install Root Certificate

1
T1130

Tasks