General

  • Target

    1a66b18ddf02f3f88f6145e8815677e01c6e0caab98a0dfe34c69e09085109da

  • Size

    3.8MB

  • Sample

    220725-e42nvaefh6

  • MD5

    d778e685decab1c2f972480caf3583c8

  • SHA1

    8f8b7f6992eb1db258b72e1bfb6ea317853b9cd0

  • SHA256

    1a66b18ddf02f3f88f6145e8815677e01c6e0caab98a0dfe34c69e09085109da

  • SHA512

    bc1f647cdd5a6cc9ab5b13ece3d32947858ccadf360feb4ebc1dfbbbec00214807e6735c22ca763b3795b0fa4739efe94101d285eabb2781fcd301c651905e37

Malware Config

Targets

    • Target

      1a66b18ddf02f3f88f6145e8815677e01c6e0caab98a0dfe34c69e09085109da

    • Size

      3.8MB

    • MD5

      d778e685decab1c2f972480caf3583c8

    • SHA1

      8f8b7f6992eb1db258b72e1bfb6ea317853b9cd0

    • SHA256

      1a66b18ddf02f3f88f6145e8815677e01c6e0caab98a0dfe34c69e09085109da

    • SHA512

      bc1f647cdd5a6cc9ab5b13ece3d32947858ccadf360feb4ebc1dfbbbec00214807e6735c22ca763b3795b0fa4739efe94101d285eabb2781fcd301c651905e37

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Windows security bypass

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Disabling Security Tools

2
T1089

Modify Registry

4
T1112

Install Root Certificate

1
T1130

Tasks