General

  • Target

    e67dcc1206efa4f500cffe522ebefcd1b0b3e3ea06670573dc60e545c014330d

  • Size

    3.8MB

  • Sample

    220520-hvrn3aaacl

  • MD5

    2e7c1c3ba8197401fbef966bba9aa130

  • SHA1

    1f5139d0f1793d75b3b461aee9798ed0f12d025a

  • SHA256

    e67dcc1206efa4f500cffe522ebefcd1b0b3e3ea06670573dc60e545c014330d

  • SHA512

    42578166a40b3759fe6aba458267b314a413ef417e96e9be694d176ef562757e66db6fc62eb17bde5d66cffe991b3c771e15e11c0b8f1afcd3e0646225804b4b

Malware Config

Targets

    • Target

      e67dcc1206efa4f500cffe522ebefcd1b0b3e3ea06670573dc60e545c014330d

    • Size

      3.8MB

    • MD5

      2e7c1c3ba8197401fbef966bba9aa130

    • SHA1

      1f5139d0f1793d75b3b461aee9798ed0f12d025a

    • SHA256

      e67dcc1206efa4f500cffe522ebefcd1b0b3e3ea06670573dc60e545c014330d

    • SHA512

      42578166a40b3759fe6aba458267b314a413ef417e96e9be694d176ef562757e66db6fc62eb17bde5d66cffe991b3c771e15e11c0b8f1afcd3e0646225804b4b

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba Payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Windows security bypass

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Modifies boot configuration data using bcdedit

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Disabling Security Tools

2
T1089

Modify Registry

4
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

1
T1012

Tasks