General
-
Target
615fd9103ed76f3699391abb2cf06d6267dab9453ac662e254202c35dbc53a79
-
Size
4.5MB
-
Sample
220730-z8eebshffr
-
MD5
8ca8725188de3e4a4cb3e5005bb02d23
-
SHA1
526ce583978781a451a3f6a1991f1f1258c05a9c
-
SHA256
615fd9103ed76f3699391abb2cf06d6267dab9453ac662e254202c35dbc53a79
-
SHA512
14ee6bd8e4e54f485f9be9c86c912bb2c8bc937483306021fc5d7373aefb5c741620b1ed8ae001686d81018aba224fab63f2183792efa6a59de2dd8562a0e84b
Static task
static1
Behavioral task
behavioral1
Sample
615fd9103ed76f3699391abb2cf06d6267dab9453ac662e254202c35dbc53a79.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
615fd9103ed76f3699391abb2cf06d6267dab9453ac662e254202c35dbc53a79.exe
Resource
win10v2004-20220722-en
Malware Config
Extracted
metasploit
windows/single_exec
Targets
-
-
Target
615fd9103ed76f3699391abb2cf06d6267dab9453ac662e254202c35dbc53a79
-
Size
4.5MB
-
MD5
8ca8725188de3e4a4cb3e5005bb02d23
-
SHA1
526ce583978781a451a3f6a1991f1f1258c05a9c
-
SHA256
615fd9103ed76f3699391abb2cf06d6267dab9453ac662e254202c35dbc53a79
-
SHA512
14ee6bd8e4e54f485f9be9c86c912bb2c8bc937483306021fc5d7373aefb5c741620b1ed8ae001686d81018aba224fab63f2183792efa6a59de2dd8562a0e84b
-
Glupteba payload
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-