General

  • Target

    samp.exe

  • Size

    4.0MB

  • Sample

    230131-gdht6aeg62

  • MD5

    545a1fcb3fdd1bc14250623a40102866

  • SHA1

    3f13f90d30e84dcfee738435e4c24a8cd479241f

  • SHA256

    7a106c4f4fac72d9aabf978e5257f1eb7aab418eff98924f2d279e73f1dac8cd

  • SHA512

    bb0b0485205f1b47156d12b43cbf2d02a4eef176ab4648fe217e63d17f88577779bfae2478da5fb1ec5d305baebffe3fadecb8bb01e2abe02512baee52d78a00

  • SSDEEP

    98304:4bjq/455k7LKeNo7yESjt/llWE5I7+RajBYf/jIvLCsWXU1/vD9KlAnW:mW/V7ui2sJlIyaXWrU+Dk1/xKanW

Malware Config

Targets

    • Target

      samp.exe

    • Size

      4.0MB

    • MD5

      545a1fcb3fdd1bc14250623a40102866

    • SHA1

      3f13f90d30e84dcfee738435e4c24a8cd479241f

    • SHA256

      7a106c4f4fac72d9aabf978e5257f1eb7aab418eff98924f2d279e73f1dac8cd

    • SHA512

      bb0b0485205f1b47156d12b43cbf2d02a4eef176ab4648fe217e63d17f88577779bfae2478da5fb1ec5d305baebffe3fadecb8bb01e2abe02512baee52d78a00

    • SSDEEP

      98304:4bjq/455k7LKeNo7yESjt/llWE5I7+RajBYf/jIvLCsWXU1/vD9KlAnW:mW/V7ui2sJlIyaXWrU+Dk1/xKanW

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Disabling Security Tools

2
T1089

Modify Registry

4
T1112

Impair Defenses

1
T1562

Install Root Certificate

1
T1130

Discovery

Query Registry

1
T1012

Tasks