Resubmissions

21-02-2023 00:02

230221-abzlkaeh3s 10

20-02-2023 23:58

230220-31l1zsda73 10

General

  • Target

    747801f16746c17a7001cc831e52e7916c171aa75c658861fe45df4b7a55ad25

  • Size

    4.0MB

  • Sample

    230220-31l1zsda73

  • MD5

    045fed4ec66ae8950965167cb6728cfc

  • SHA1

    c485e54bd2b16a254ec4d46ba997c3c5ec1b4203

  • SHA256

    747801f16746c17a7001cc831e52e7916c171aa75c658861fe45df4b7a55ad25

  • SHA512

    af247910b920a2311d2c71c159b0f463c80c85a5b402a6c5b683b884b8b1d2b6f8154dadc1e0c9b33658c84f2d38c3e36dbab458d5176bc0a5229c01abc4018f

  • SSDEEP

    49152:JwLeW63sqJsyS6O/jaqlKT6YKEn42BFFaCmkBBf2ieCRgzjhCGNY6OuKr0V9eaZr:auCM6x72BugzRgv2rP6eQJQ4x2RmF1J

Malware Config

Targets

    • Target

      747801f16746c17a7001cc831e52e7916c171aa75c658861fe45df4b7a55ad25

    • Size

      4.0MB

    • MD5

      045fed4ec66ae8950965167cb6728cfc

    • SHA1

      c485e54bd2b16a254ec4d46ba997c3c5ec1b4203

    • SHA256

      747801f16746c17a7001cc831e52e7916c171aa75c658861fe45df4b7a55ad25

    • SHA512

      af247910b920a2311d2c71c159b0f463c80c85a5b402a6c5b683b884b8b1d2b6f8154dadc1e0c9b33658c84f2d38c3e36dbab458d5176bc0a5229c01abc4018f

    • SSDEEP

      49152:JwLeW63sqJsyS6O/jaqlKT6YKEn42BFFaCmkBBf2ieCRgzjhCGNY6OuKr0V9eaZr:auCM6x72BugzRgv2rP6eQJQ4x2RmF1J

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Modifies Windows Firewall

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Tasks