General

  • Target

    ccea3d36d7f317cc85cd067e634cc4428d2ab1a26c4cd4f1b3599cb5f1e1961f

  • Size

    4.1MB

  • Sample

    230328-ywa1psdb49

  • MD5

    d5f9586c5b24e12d2af0c1ca8df62c10

  • SHA1

    ed526b79b81ad32f72fad9751d17fd80ea17a267

  • SHA256

    ccea3d36d7f317cc85cd067e634cc4428d2ab1a26c4cd4f1b3599cb5f1e1961f

  • SHA512

    4c2af04156a2bd64a52504371d0623b9a29a71c4372628b33abe538f87b9c1b87c5decbc3a5e4f095b063e292b2a791c8f537d44e456d32e9a8e0a7ea3de005c

  • SSDEEP

    98304:kELwTlvdgEX2NpXI1CvrZ0wYkLx78mDXz//wDHa17+P6a+DsJxVO2PFu:kEaAEXAsCv10rkLuUz//Wa1iPqsJxVOv

Malware Config

Targets

    • Target

      ccea3d36d7f317cc85cd067e634cc4428d2ab1a26c4cd4f1b3599cb5f1e1961f

    • Size

      4.1MB

    • MD5

      d5f9586c5b24e12d2af0c1ca8df62c10

    • SHA1

      ed526b79b81ad32f72fad9751d17fd80ea17a267

    • SHA256

      ccea3d36d7f317cc85cd067e634cc4428d2ab1a26c4cd4f1b3599cb5f1e1961f

    • SHA512

      4c2af04156a2bd64a52504371d0623b9a29a71c4372628b33abe538f87b9c1b87c5decbc3a5e4f095b063e292b2a791c8f537d44e456d32e9a8e0a7ea3de005c

    • SSDEEP

      98304:kELwTlvdgEX2NpXI1CvrZ0wYkLx78mDXz//wDHa17+P6a+DsJxVO2PFu:kEaAEXAsCv10rkLuUz//Wa1iPqsJxVOv

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Windows security bypass

    • Modifies Windows Firewall

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Disabling Security Tools

2
T1089

Modify Registry

3
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Tasks