General

  • Target

    111c8ba51af8712f8a903b029da24a06e26ff7af4d318eacb7ebacd069921921

  • Size

    4.1MB

  • Sample

    231001-17pz4sff59

  • MD5

    a7cccf56b0648144fa8893d1fbbd0445

  • SHA1

    aac182b7638f63845f63c571f5b92369206512e7

  • SHA256

    111c8ba51af8712f8a903b029da24a06e26ff7af4d318eacb7ebacd069921921

  • SHA512

    92844ba0849a67dca3c1abee4d67e6861633e0d046df5d2295a874db3f645ae9ea95ef01f1cc793e829c2f3c30a3fa292b2b1d883aa0c86f7f65c3da6f86c33a

  • SSDEEP

    98304:gr7OmhM+a53oPjyIvdoCriHkyca3H9yhCDOu3c7:Y7q+iBCRro3HSCDBM7

Malware Config

Targets

    • Target

      111c8ba51af8712f8a903b029da24a06e26ff7af4d318eacb7ebacd069921921

    • Size

      4.1MB

    • MD5

      a7cccf56b0648144fa8893d1fbbd0445

    • SHA1

      aac182b7638f63845f63c571f5b92369206512e7

    • SHA256

      111c8ba51af8712f8a903b029da24a06e26ff7af4d318eacb7ebacd069921921

    • SHA512

      92844ba0849a67dca3c1abee4d67e6861633e0d046df5d2295a874db3f645ae9ea95ef01f1cc793e829c2f3c30a3fa292b2b1d883aa0c86f7f65c3da6f86c33a

    • SSDEEP

      98304:gr7OmhM+a53oPjyIvdoCriHkyca3H9yhCDOu3c7:Y7q+iBCRro3HSCDBM7

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks