General

  • Target

    5602f61f952e4288f00d812a4283ed7768b19880b1c36e6ab46a64ce0877a3a2

  • Size

    5.0MB

  • Sample

    220724-ydzaksdhg6

  • MD5

    9c6a38f279505bf3e4f0172f73fec25a

  • SHA1

    c3fc13e829d0643d015413d678c4cd39caf065b5

  • SHA256

    5602f61f952e4288f00d812a4283ed7768b19880b1c36e6ab46a64ce0877a3a2

  • SHA512

    cde1977f626c94fb735f0beba6c1fa7163fa87c1efc2cb0ddca97e4d273a50bdec2e7d69dda6703f8918b19e4cde427bda3fc055a2e258dbcd98a7c135e1050a

Malware Config

Targets

    • Target

      5602f61f952e4288f00d812a4283ed7768b19880b1c36e6ab46a64ce0877a3a2

    • Size

      5.0MB

    • MD5

      9c6a38f279505bf3e4f0172f73fec25a

    • SHA1

      c3fc13e829d0643d015413d678c4cd39caf065b5

    • SHA256

      5602f61f952e4288f00d812a4283ed7768b19880b1c36e6ab46a64ce0877a3a2

    • SHA512

      cde1977f626c94fb735f0beba6c1fa7163fa87c1efc2cb0ddca97e4d273a50bdec2e7d69dda6703f8918b19e4cde427bda3fc055a2e258dbcd98a7c135e1050a

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Windows security bypass

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Disabling Security Tools

2
T1089

Modify Registry

4
T1112

Install Root Certificate

1
T1130

Tasks