General
-
Target
8dca66530f1f9f6bed8fd63eb37510f3ec9006e88ac2be8a9e566f03a93e8deb
-
Size
4.2MB
-
Sample
231011-mkkj8aah48
-
MD5
b31d195b6ff739ecb4692abf48249592
-
SHA1
980dac970f17260d628e0119d7dd459961027782
-
SHA256
8dca66530f1f9f6bed8fd63eb37510f3ec9006e88ac2be8a9e566f03a93e8deb
-
SHA512
4c22d09bb71071255f82f8a4e0263ea06fc8780833d590962f41b28b8c5e357b6bf5bdafaeeed2e84d5fbd70a9f24070ffa97827cde9a7485b694530ddb8c35d
-
SSDEEP
98304:NlTJU11Z5ebd8T2HjuuS0A2NomZs1wfPDydNLBR:nTW95V2DJA2Xm1QPudjR
Static task
static1
Behavioral task
behavioral1
Sample
8dca66530f1f9f6bed8fd63eb37510f3ec9006e88ac2be8a9e566f03a93e8deb.exe
Resource
win7-20230831-en
Malware Config
Targets
-
-
Target
8dca66530f1f9f6bed8fd63eb37510f3ec9006e88ac2be8a9e566f03a93e8deb
-
Size
4.2MB
-
MD5
b31d195b6ff739ecb4692abf48249592
-
SHA1
980dac970f17260d628e0119d7dd459961027782
-
SHA256
8dca66530f1f9f6bed8fd63eb37510f3ec9006e88ac2be8a9e566f03a93e8deb
-
SHA512
4c22d09bb71071255f82f8a4e0263ea06fc8780833d590962f41b28b8c5e357b6bf5bdafaeeed2e84d5fbd70a9f24070ffa97827cde9a7485b694530ddb8c35d
-
SSDEEP
98304:NlTJU11Z5ebd8T2HjuuS0A2NomZs1wfPDydNLBR:nTW95V2DJA2Xm1QPudjR
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1