General

  • Target

    7ba65ed25eaa97c6dc38d16a2d4255141237ad266fb85fbe35cb257d4e46815e

  • Size

    5.1MB

  • Sample

    220520-rr3ftsgce4

  • MD5

    fa7d5ed7ede165559ea6ad8eca4b80fd

  • SHA1

    362fb00be5538cf986656f85b53b5b1afe4d685c

  • SHA256

    7ba65ed25eaa97c6dc38d16a2d4255141237ad266fb85fbe35cb257d4e46815e

  • SHA512

    309287c6b622b2e45b15f9a09505eb78e501c8809f598dd7ba637f0020072fb5a6dc9a7034122cf89e55c33ad03914bd7c3ba090cca072446b063af831c64539

Malware Config

Targets

    • Target

      7ba65ed25eaa97c6dc38d16a2d4255141237ad266fb85fbe35cb257d4e46815e

    • Size

      5.1MB

    • MD5

      fa7d5ed7ede165559ea6ad8eca4b80fd

    • SHA1

      362fb00be5538cf986656f85b53b5b1afe4d685c

    • SHA256

      7ba65ed25eaa97c6dc38d16a2d4255141237ad266fb85fbe35cb257d4e46815e

    • SHA512

      309287c6b622b2e45b15f9a09505eb78e501c8809f598dd7ba637f0020072fb5a6dc9a7034122cf89e55c33ad03914bd7c3ba090cca072446b063af831c64539

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba Payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Windows security bypass

    • suricata: ET MALWARE Glupteba CnC Domain in DNS Lookup

      suricata: ET MALWARE Glupteba CnC Domain in DNS Lookup

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Disabling Security Tools

2
T1089

Modify Registry

4
T1112

Install Root Certificate

1
T1130

Tasks