General
-
Target
ae059e512dd80b3c8013ed9a36404bcaa70e2e6c90d782a545ab6005c456c564_JC.exe
-
Size
4.1MB
-
Sample
231005-wza4rsdh4v
-
MD5
37b6afcb85c3e4432eb23b6854c3a4f5
-
SHA1
fca76d1d95237c20b383d260274aa5f883e69d99
-
SHA256
ae059e512dd80b3c8013ed9a36404bcaa70e2e6c90d782a545ab6005c456c564
-
SHA512
f53c7570d4d9d4b98d5cf799f68f729c9e0759465e9ca8d46fbabb5dba5d9f24a35d73785acefd437f085dcfcb526c3f89887d256934a1c83d0ff48b07421473
-
SSDEEP
98304:2sgW9rfApQAQ5yzwO1Y/4kXG7tUkbcQ+fSRxyDIXZfS6QZnt:2shlMrQ5yzwOC/nXG7NcbfSRcDgVr2t
Static task
static1
Behavioral task
behavioral1
Sample
ae059e512dd80b3c8013ed9a36404bcaa70e2e6c90d782a545ab6005c456c564_JC.exe
Resource
win7-20230831-en
Malware Config
Targets
-
-
Target
ae059e512dd80b3c8013ed9a36404bcaa70e2e6c90d782a545ab6005c456c564_JC.exe
-
Size
4.1MB
-
MD5
37b6afcb85c3e4432eb23b6854c3a4f5
-
SHA1
fca76d1d95237c20b383d260274aa5f883e69d99
-
SHA256
ae059e512dd80b3c8013ed9a36404bcaa70e2e6c90d782a545ab6005c456c564
-
SHA512
f53c7570d4d9d4b98d5cf799f68f729c9e0759465e9ca8d46fbabb5dba5d9f24a35d73785acefd437f085dcfcb526c3f89887d256934a1c83d0ff48b07421473
-
SSDEEP
98304:2sgW9rfApQAQ5yzwO1Y/4kXG7tUkbcQ+fSRxyDIXZfS6QZnt:2shlMrQ5yzwOC/nXG7NcbfSRcDgVr2t
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1