General

  • Target

    5c1106c0087e6cec15f71b08ca85b82555e408948755a9fd7afb5a05b3eae652

  • Size

    3.0MB

  • Sample

    220801-s7ym9abfd9

  • MD5

    b65ef3b1179103472fce60e4362897fd

  • SHA1

    fd06f91dd3da56b3066d5b180df8ebc9e595a09d

  • SHA256

    5c1106c0087e6cec15f71b08ca85b82555e408948755a9fd7afb5a05b3eae652

  • SHA512

    ec077cc582d820c10b94ddf563a7e89d0d25d3683c1ed95e04288ea47390d9dbc65be8ac33e3b40e6a5ad1802baff14faf32459b5e61b520d1436aac500f4bc1

Malware Config

Targets

    • Target

      5c1106c0087e6cec15f71b08ca85b82555e408948755a9fd7afb5a05b3eae652

    • Size

      3.0MB

    • MD5

      b65ef3b1179103472fce60e4362897fd

    • SHA1

      fd06f91dd3da56b3066d5b180df8ebc9e595a09d

    • SHA256

      5c1106c0087e6cec15f71b08ca85b82555e408948755a9fd7afb5a05b3eae652

    • SHA512

      ec077cc582d820c10b94ddf563a7e89d0d25d3683c1ed95e04288ea47390d9dbc65be8ac33e3b40e6a5ad1802baff14faf32459b5e61b520d1436aac500f4bc1

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Windows security bypass

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Disabling Security Tools

2
T1089

Modify Registry

4
T1112

Install Root Certificate

1
T1130

Tasks