General

  • Target

    324d3cb7058af603d8ad4b0df3ce695dfaa18f0f1b3c753c68ad49000e21df90

  • Size

    3.9MB

  • Sample

    230129-wlvk9ahf7v

  • MD5

    8448f9442c842ab6786ff1952b8f478a

  • SHA1

    5b4ae7c215765c3fbf5e56f127eaecff8715e2ad

  • SHA256

    324d3cb7058af603d8ad4b0df3ce695dfaa18f0f1b3c753c68ad49000e21df90

  • SHA512

    56d3c4dffa68daac1bae9241ab2f542747ac743766d61f91d87a57e7f2a66d3d94a46e82f94fcf7ea5f136e3049b641206709214a92f10579bc6a22be5ce0481

  • SSDEEP

    49152:J5PcrbPqqUpkqxi32UPC4e0IOgzv3YF4zUw4JkfSinDDu+e/eCNVuyn9Vkdlo9CY:nqe1UC47Is4gfSupRPtUAbJTSM

Malware Config

Extracted

Family

metasploit

Version

windows/single_exec

Targets

    • Target

      324d3cb7058af603d8ad4b0df3ce695dfaa18f0f1b3c753c68ad49000e21df90

    • Size

      3.9MB

    • MD5

      8448f9442c842ab6786ff1952b8f478a

    • SHA1

      5b4ae7c215765c3fbf5e56f127eaecff8715e2ad

    • SHA256

      324d3cb7058af603d8ad4b0df3ce695dfaa18f0f1b3c753c68ad49000e21df90

    • SHA512

      56d3c4dffa68daac1bae9241ab2f542747ac743766d61f91d87a57e7f2a66d3d94a46e82f94fcf7ea5f136e3049b641206709214a92f10579bc6a22be5ce0481

    • SSDEEP

      49152:J5PcrbPqqUpkqxi32UPC4e0IOgzv3YF4zUw4JkfSinDDu+e/eCNVuyn9Vkdlo9CY:nqe1UC47Is4gfSupRPtUAbJTSM

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Disabling Security Tools

2
T1089

Modify Registry

4
T1112

Impair Defenses

1
T1562

Install Root Certificate

1
T1130

Discovery

Query Registry

1
T1012

Tasks