General
-
Target
8efb0954018a7713a746b09420ee004048838a32f332f9b453199180c3d9a6d1
-
Size
3.9MB
-
Sample
230129-w6wn2sad7z
-
MD5
8e3dd4b2c83474a516fa297a16fea4ce
-
SHA1
9199353c28a3662c946c916dc83af1c5f0dddc86
-
SHA256
8efb0954018a7713a746b09420ee004048838a32f332f9b453199180c3d9a6d1
-
SHA512
4ba955dbba361197fe6124071f8bf54a2e12f0ce68c09d8fef5f234a94910b2c623431548d637a05461cabf83c61dc84115d74f7f03ca69926811c4bf30c1769
-
SSDEEP
98304:4fcLWjMUnMeRwL5U+O6EGzG3R43ieRv2Jy5Km4AnIL2Kyt29:40LWoDeRO5U+O2M43wQASsN7
Static task
static1
Behavioral task
behavioral1
Sample
8efb0954018a7713a746b09420ee004048838a32f332f9b453199180c3d9a6d1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8efb0954018a7713a746b09420ee004048838a32f332f9b453199180c3d9a6d1.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
metasploit
windows/single_exec
Targets
-
-
Target
8efb0954018a7713a746b09420ee004048838a32f332f9b453199180c3d9a6d1
-
Size
3.9MB
-
MD5
8e3dd4b2c83474a516fa297a16fea4ce
-
SHA1
9199353c28a3662c946c916dc83af1c5f0dddc86
-
SHA256
8efb0954018a7713a746b09420ee004048838a32f332f9b453199180c3d9a6d1
-
SHA512
4ba955dbba361197fe6124071f8bf54a2e12f0ce68c09d8fef5f234a94910b2c623431548d637a05461cabf83c61dc84115d74f7f03ca69926811c4bf30c1769
-
SSDEEP
98304:4fcLWjMUnMeRwL5U+O6EGzG3R43ieRv2Jy5Km4AnIL2Kyt29:40LWoDeRO5U+O2M43wQASsN7
-
Glupteba payload
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-