General
-
Target
NEAS.e1f21802027b1a0c05136da5fdfe2cb8a6be0bcc0122141791d09d6ffe968bb2_JC.exe
-
Size
4.2MB
-
Sample
231007-q69b9ach3x
-
MD5
cb092d2a87995d508fd62cf71dcaeee2
-
SHA1
9708a670aada972e72cdd5afb8dd7872377da012
-
SHA256
e1f21802027b1a0c05136da5fdfe2cb8a6be0bcc0122141791d09d6ffe968bb2
-
SHA512
86c3cbc070b8a46624328ec362f6e35100f14c758945b1b8ed66179283e1f1e85b75d28e0dd14da4888235d496aa51556480f3a75bc78d7c73d97ad595904e5c
-
SSDEEP
98304:mu9/Ekd5KgGrlk0LBjcxDk0Da5OI9aJG1U8nhzRn4FyjH+D:mI/tjglk01/0Da79aJG1RnfiyjHe
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.e1f21802027b1a0c05136da5fdfe2cb8a6be0bcc0122141791d09d6ffe968bb2_JC.exe
Resource
win7-20230831-en
Malware Config
Targets
-
-
Target
NEAS.e1f21802027b1a0c05136da5fdfe2cb8a6be0bcc0122141791d09d6ffe968bb2_JC.exe
-
Size
4.2MB
-
MD5
cb092d2a87995d508fd62cf71dcaeee2
-
SHA1
9708a670aada972e72cdd5afb8dd7872377da012
-
SHA256
e1f21802027b1a0c05136da5fdfe2cb8a6be0bcc0122141791d09d6ffe968bb2
-
SHA512
86c3cbc070b8a46624328ec362f6e35100f14c758945b1b8ed66179283e1f1e85b75d28e0dd14da4888235d496aa51556480f3a75bc78d7c73d97ad595904e5c
-
SSDEEP
98304:mu9/Ekd5KgGrlk0LBjcxDk0Da5OI9aJG1U8nhzRn4FyjH+D:mI/tjglk01/0Da79aJG1RnfiyjHe
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1