General
-
Target
57c1859eda4e09e6c1e4e7473c182b307efc4a2e7ca31bd04835d9260e604a04
-
Size
3.8MB
-
Sample
220524-dq81bsdga6
-
MD5
384c8fe4b39ea4b83c8eec594d1851f1
-
SHA1
6d41e9496c2dc79c5b46fe33133b764aaa8a6e64
-
SHA256
57c1859eda4e09e6c1e4e7473c182b307efc4a2e7ca31bd04835d9260e604a04
-
SHA512
ddd9b07cbbfeee5c6044093b293bb4b176497f9a0ed8850f55729f65771387a7571c373d614491b8c17d2ce589e4d13aacf4b78e754da9aa6424556713b1cfd4
Static task
static1
Behavioral task
behavioral1
Sample
57c1859eda4e09e6c1e4e7473c182b307efc4a2e7ca31bd04835d9260e604a04.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
57c1859eda4e09e6c1e4e7473c182b307efc4a2e7ca31bd04835d9260e604a04.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
57c1859eda4e09e6c1e4e7473c182b307efc4a2e7ca31bd04835d9260e604a04
-
Size
3.8MB
-
MD5
384c8fe4b39ea4b83c8eec594d1851f1
-
SHA1
6d41e9496c2dc79c5b46fe33133b764aaa8a6e64
-
SHA256
57c1859eda4e09e6c1e4e7473c182b307efc4a2e7ca31bd04835d9260e604a04
-
SHA512
ddd9b07cbbfeee5c6044093b293bb4b176497f9a0ed8850f55729f65771387a7571c373d614491b8c17d2ce589e4d13aacf4b78e754da9aa6424556713b1cfd4
-
Glupteba Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Modifies boot configuration data using bcdedit
-
Drops file in System32 directory
-