General
-
Target
2dc4a8e21e1b3df4b1b336bb439fb8344b8102389a8270d32f99f4c0366de0b4
-
Size
4.1MB
-
Sample
231010-1l3dbafd23
-
MD5
462fef26074081ead92c9ba57c3d6387
-
SHA1
7c5b6602809f685d59521fff500be1d2993c912d
-
SHA256
2dc4a8e21e1b3df4b1b336bb439fb8344b8102389a8270d32f99f4c0366de0b4
-
SHA512
6bf26eb8de79db1754f3c918a44ab21a27a16152eaf4977ec9c9bb03fb50f4fb01cdade903e8db0421533f6187d9284512fae135653acdb3bb324d08214137d7
-
SSDEEP
49152:cvvs6bgkKPFLz+yPjob5CC1GsZg828PJ+wmn4g4LQNHVzn+PX/UHHwA9mwiWCqH3:cvvsOKhr8wqcnXlHt+GHjq1yqzeqsV
Static task
static1
Behavioral task
behavioral1
Sample
2dc4a8e21e1b3df4b1b336bb439fb8344b8102389a8270d32f99f4c0366de0b4.exe
Resource
win7-20230831-en
Malware Config
Targets
-
-
Target
2dc4a8e21e1b3df4b1b336bb439fb8344b8102389a8270d32f99f4c0366de0b4
-
Size
4.1MB
-
MD5
462fef26074081ead92c9ba57c3d6387
-
SHA1
7c5b6602809f685d59521fff500be1d2993c912d
-
SHA256
2dc4a8e21e1b3df4b1b336bb439fb8344b8102389a8270d32f99f4c0366de0b4
-
SHA512
6bf26eb8de79db1754f3c918a44ab21a27a16152eaf4977ec9c9bb03fb50f4fb01cdade903e8db0421533f6187d9284512fae135653acdb3bb324d08214137d7
-
SSDEEP
49152:cvvs6bgkKPFLz+yPjob5CC1GsZg828PJ+wmn4g4LQNHVzn+PX/UHHwA9mwiWCqH3:cvvsOKhr8wqcnXlHt+GHjq1yqzeqsV
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1