General

  • Target

    2a9a76e1cd24b7d30675ea936137f7b159424e318a9bc086f466ead4ee6ae579

  • Size

    5.0MB

  • Sample

    220521-m25lqache8

  • MD5

    27d671e5478cb71030023d80834f713f

  • SHA1

    00599520f60ced4ad5d5985b6866c16752a30e82

  • SHA256

    2a9a76e1cd24b7d30675ea936137f7b159424e318a9bc086f466ead4ee6ae579

  • SHA512

    ee0aa0b0e8b111eec375dbb380b71dd9b27b256d8b703f8536059c475abf4c41e895a484c4c7ef780d60247b9cc9c864215040febcaac325371a145109a9f8fd

Malware Config

Targets

    • Target

      2a9a76e1cd24b7d30675ea936137f7b159424e318a9bc086f466ead4ee6ae579

    • Size

      5.0MB

    • MD5

      27d671e5478cb71030023d80834f713f

    • SHA1

      00599520f60ced4ad5d5985b6866c16752a30e82

    • SHA256

      2a9a76e1cd24b7d30675ea936137f7b159424e318a9bc086f466ead4ee6ae579

    • SHA512

      ee0aa0b0e8b111eec375dbb380b71dd9b27b256d8b703f8536059c475abf4c41e895a484c4c7ef780d60247b9cc9c864215040febcaac325371a145109a9f8fd

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba Payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Windows security bypass

    • suricata: ET MALWARE Glupteba CnC Domain in DNS Lookup

      suricata: ET MALWARE Glupteba CnC Domain in DNS Lookup

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Disabling Security Tools

2
T1089

Modify Registry

4
T1112

Install Root Certificate

1
T1130

Tasks