General
-
Target
b5930d667400c1dfa6e3d7805b765216201bdd86268c26772231b4cedfcba169
-
Size
3.8MB
-
Sample
220524-t4n53sddgr
-
MD5
df30290e023d2e773cbabf8ba9573487
-
SHA1
ed8fae596b776b48030214f4a4da87dbe0fe666c
-
SHA256
b5930d667400c1dfa6e3d7805b765216201bdd86268c26772231b4cedfcba169
-
SHA512
e1f80bb47fbf51a042966562c9d52ee2ccc4868370ff6a45f5ac2ff0284538e6e0783d7e5a5ae1fd9e2821e70bc9b634112bbbbc02f0737cd856a6c4796eeb0b
Static task
static1
Behavioral task
behavioral1
Sample
b5930d667400c1dfa6e3d7805b765216201bdd86268c26772231b4cedfcba169.exe
Resource
win7-20220414-en
Malware Config
Targets
-
-
Target
b5930d667400c1dfa6e3d7805b765216201bdd86268c26772231b4cedfcba169
-
Size
3.8MB
-
MD5
df30290e023d2e773cbabf8ba9573487
-
SHA1
ed8fae596b776b48030214f4a4da87dbe0fe666c
-
SHA256
b5930d667400c1dfa6e3d7805b765216201bdd86268c26772231b4cedfcba169
-
SHA512
e1f80bb47fbf51a042966562c9d52ee2ccc4868370ff6a45f5ac2ff0284538e6e0783d7e5a5ae1fd9e2821e70bc9b634112bbbbc02f0737cd856a6c4796eeb0b
-
Glupteba Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Modifies boot configuration data using bcdedit
-
Drops file in System32 directory
-