General
-
Target
48988fe8f80c68087d61ca94db8914f03825624879c725118d6bbe2a2d2744f8
-
Size
4.1MB
-
Sample
231010-1kpqtsfb94
-
MD5
935ca540df57eaa35771d1e5030ee4cf
-
SHA1
a4974621c1a14528d4ac0cfc2a38e0ca5b8e7e90
-
SHA256
48988fe8f80c68087d61ca94db8914f03825624879c725118d6bbe2a2d2744f8
-
SHA512
c8d1d05e29009278b08d442e2c908a67c80a02ba5619bbf133b44fd2ad25647aadefdd0541c6ab5907cb338f3f4bc7ee557dcd404e69c20851627e71df7ea27f
-
SSDEEP
49152:cvvs6bgkKPFLz+yPjob5CC1GsZg828PJ+wmn4g4LQNHVzn+PX/UHHwA9mwiWCqHY:cvvsOKhr8wqcnXlHt+GHjq1yqzeqs+
Static task
static1
Behavioral task
behavioral1
Sample
48988fe8f80c68087d61ca94db8914f03825624879c725118d6bbe2a2d2744f8.exe
Resource
win7-20230831-en
Malware Config
Targets
-
-
Target
48988fe8f80c68087d61ca94db8914f03825624879c725118d6bbe2a2d2744f8
-
Size
4.1MB
-
MD5
935ca540df57eaa35771d1e5030ee4cf
-
SHA1
a4974621c1a14528d4ac0cfc2a38e0ca5b8e7e90
-
SHA256
48988fe8f80c68087d61ca94db8914f03825624879c725118d6bbe2a2d2744f8
-
SHA512
c8d1d05e29009278b08d442e2c908a67c80a02ba5619bbf133b44fd2ad25647aadefdd0541c6ab5907cb338f3f4bc7ee557dcd404e69c20851627e71df7ea27f
-
SSDEEP
49152:cvvs6bgkKPFLz+yPjob5CC1GsZg828PJ+wmn4g4LQNHVzn+PX/UHHwA9mwiWCqHY:cvvsOKhr8wqcnXlHt+GHjq1yqzeqs+
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1