General
-
Target
89882b5d47628b41a8d08149cf00239ea741ed9178bfa893a459d3fc1f7bb5a0
-
Size
4.1MB
-
Sample
231012-eksa3aff42
-
MD5
8cb43bcd04e1bf6d1150616be8520ae7
-
SHA1
b2297164f879b2f102f665ed7f4d24e735f465ab
-
SHA256
89882b5d47628b41a8d08149cf00239ea741ed9178bfa893a459d3fc1f7bb5a0
-
SHA512
ed1844939656ce0bf96204f1d095a1e41c91c37d927579a4e3afaa45c2b12a18dc8063977baca22c5f9a4d6b00a8f43550570950d126b1ca5393e32aab741307
-
SSDEEP
98304:b4DqGrz8puMc/m9fMa4HAtWXysSkHKsW69OaaVO89RI:b4qGrz8oM9f+HcWzXqboOaaf9RI
Static task
static1
Behavioral task
behavioral1
Sample
89882b5d47628b41a8d08149cf00239ea741ed9178bfa893a459d3fc1f7bb5a0.exe
Resource
win7-20230831-en
Malware Config
Targets
-
-
Target
89882b5d47628b41a8d08149cf00239ea741ed9178bfa893a459d3fc1f7bb5a0
-
Size
4.1MB
-
MD5
8cb43bcd04e1bf6d1150616be8520ae7
-
SHA1
b2297164f879b2f102f665ed7f4d24e735f465ab
-
SHA256
89882b5d47628b41a8d08149cf00239ea741ed9178bfa893a459d3fc1f7bb5a0
-
SHA512
ed1844939656ce0bf96204f1d095a1e41c91c37d927579a4e3afaa45c2b12a18dc8063977baca22c5f9a4d6b00a8f43550570950d126b1ca5393e32aab741307
-
SSDEEP
98304:b4DqGrz8puMc/m9fMa4HAtWXysSkHKsW69OaaVO89RI:b4qGrz8oM9f+HcWzXqboOaaf9RI
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1