General
-
Target
fe1cb123d893460418c66765a84e4ddc89bd52698307318832c1b8afbd938dd3
-
Size
4.1MB
-
Sample
231012-lvp21sbf91
-
MD5
0fdcfcad274c54b9ebd33d04a64bc28f
-
SHA1
5588e8de636f48401b788ef1d61175bf8fe177b1
-
SHA256
fe1cb123d893460418c66765a84e4ddc89bd52698307318832c1b8afbd938dd3
-
SHA512
c5bd0a2b07aa42563de9dcd40d46ac5f6d23b4719790cfc3809acf278db5d1bc08b4674e73599a5a39bf360b932c3b86d6e195c458e0dba4d0b336ca22d7923d
-
SSDEEP
98304:KAEjFRbwS/VEsCJv1WbKzW2rtnR98Rqo8zEICdCqkvB1Kx9g:NEjbbwS/VETJ3ptR98mopdvQf26
Static task
static1
Behavioral task
behavioral1
Sample
fe1cb123d893460418c66765a84e4ddc89bd52698307318832c1b8afbd938dd3.exe
Resource
win7-20230831-en
Malware Config
Targets
-
-
Target
fe1cb123d893460418c66765a84e4ddc89bd52698307318832c1b8afbd938dd3
-
Size
4.1MB
-
MD5
0fdcfcad274c54b9ebd33d04a64bc28f
-
SHA1
5588e8de636f48401b788ef1d61175bf8fe177b1
-
SHA256
fe1cb123d893460418c66765a84e4ddc89bd52698307318832c1b8afbd938dd3
-
SHA512
c5bd0a2b07aa42563de9dcd40d46ac5f6d23b4719790cfc3809acf278db5d1bc08b4674e73599a5a39bf360b932c3b86d6e195c458e0dba4d0b336ca22d7923d
-
SSDEEP
98304:KAEjFRbwS/VEsCJv1WbKzW2rtnR98Rqo8zEICdCqkvB1Kx9g:NEjbbwS/VETJ3ptR98mopdvQf26
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1