General

  • Target

    ae059e512dd80b3c8013ed9a36404bcaa70e2e6c90d782a545ab6005c456c564_JC.exe

  • Size

    4.1MB

  • Sample

    231005-wza4rsdh4v

  • MD5

    37b6afcb85c3e4432eb23b6854c3a4f5

  • SHA1

    fca76d1d95237c20b383d260274aa5f883e69d99

  • SHA256

    ae059e512dd80b3c8013ed9a36404bcaa70e2e6c90d782a545ab6005c456c564

  • SHA512

    f53c7570d4d9d4b98d5cf799f68f729c9e0759465e9ca8d46fbabb5dba5d9f24a35d73785acefd437f085dcfcb526c3f89887d256934a1c83d0ff48b07421473

  • SSDEEP

    98304:2sgW9rfApQAQ5yzwO1Y/4kXG7tUkbcQ+fSRxyDIXZfS6QZnt:2shlMrQ5yzwOC/nXG7NcbfSRcDgVr2t

Malware Config

Targets

    • Target

      ae059e512dd80b3c8013ed9a36404bcaa70e2e6c90d782a545ab6005c456c564_JC.exe

    • Size

      4.1MB

    • MD5

      37b6afcb85c3e4432eb23b6854c3a4f5

    • SHA1

      fca76d1d95237c20b383d260274aa5f883e69d99

    • SHA256

      ae059e512dd80b3c8013ed9a36404bcaa70e2e6c90d782a545ab6005c456c564

    • SHA512

      f53c7570d4d9d4b98d5cf799f68f729c9e0759465e9ca8d46fbabb5dba5d9f24a35d73785acefd437f085dcfcb526c3f89887d256934a1c83d0ff48b07421473

    • SSDEEP

      98304:2sgW9rfApQAQ5yzwO1Y/4kXG7tUkbcQ+fSRxyDIXZfS6QZnt:2shlMrQ5yzwOC/nXG7NcbfSRcDgVr2t

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks