General
-
Target
3881a06f5fba6380b43ecad7f89b2eaa4e4b2abfdd628257030779c1d1a4658d
-
Size
3.9MB
-
Sample
220516-p2rqzacbe2
-
MD5
8b0b88f09f4d6b09e1cd5e9b9edfbfb7
-
SHA1
32753f80a6c2cbda1ec27c6cc4c240ab447a8353
-
SHA256
3881a06f5fba6380b43ecad7f89b2eaa4e4b2abfdd628257030779c1d1a4658d
-
SHA512
27f89f7f2a075445b1175d11e2dd64449f8326d538bef1249a045ddc348efb20969ceee5e17af6b15cab7f7a2d4dc9df7b4fb44540bea5d41428b7235d5e6f1e
Static task
static1
Behavioral task
behavioral1
Sample
3881a06f5fba6380b43ecad7f89b2eaa4e4b2abfdd628257030779c1d1a4658d.exe
Resource
win7-20220414-en
Malware Config
Targets
-
-
Target
3881a06f5fba6380b43ecad7f89b2eaa4e4b2abfdd628257030779c1d1a4658d
-
Size
3.9MB
-
MD5
8b0b88f09f4d6b09e1cd5e9b9edfbfb7
-
SHA1
32753f80a6c2cbda1ec27c6cc4c240ab447a8353
-
SHA256
3881a06f5fba6380b43ecad7f89b2eaa4e4b2abfdd628257030779c1d1a4658d
-
SHA512
27f89f7f2a075445b1175d11e2dd64449f8326d538bef1249a045ddc348efb20969ceee5e17af6b15cab7f7a2d4dc9df7b4fb44540bea5d41428b7235d5e6f1e
-
Glupteba Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Modifies boot configuration data using bcdedit
-