General
-
Target
JC_b34778e1e7318014d0531e3b133352ec040ba7f849eb1580573dfd7a19d229c2
-
Size
4.1MB
-
Sample
231012-sgtavahe98
-
MD5
40fdd3470eafbbb940a2b2fde2e61573
-
SHA1
e907898202f85504b41056fbb2a382f507cf604c
-
SHA256
b34778e1e7318014d0531e3b133352ec040ba7f849eb1580573dfd7a19d229c2
-
SHA512
b280ca49fd5adeb9bce478d0c6d1b5cbfc554be7b2881ad80ab2f54eccd5ab2b42e9fa225e0960939ddbdfa723596dd486c8fcce668959a369dd305512c3fff0
-
SSDEEP
98304:i7ID22sJjt4FfZ5oMjSocKgIYHKBOhaIBhF+qd:A2PIR4D57c5haahB
Static task
static1
Behavioral task
behavioral1
Sample
JC_b34778e1e7318014d0531e3b133352ec040ba7f849eb1580573dfd7a19d229c2.exe
Resource
win7-20230831-en
Malware Config
Targets
-
-
Target
JC_b34778e1e7318014d0531e3b133352ec040ba7f849eb1580573dfd7a19d229c2
-
Size
4.1MB
-
MD5
40fdd3470eafbbb940a2b2fde2e61573
-
SHA1
e907898202f85504b41056fbb2a382f507cf604c
-
SHA256
b34778e1e7318014d0531e3b133352ec040ba7f849eb1580573dfd7a19d229c2
-
SHA512
b280ca49fd5adeb9bce478d0c6d1b5cbfc554be7b2881ad80ab2f54eccd5ab2b42e9fa225e0960939ddbdfa723596dd486c8fcce668959a369dd305512c3fff0
-
SSDEEP
98304:i7ID22sJjt4FfZ5oMjSocKgIYHKBOhaIBhF+qd:A2PIR4D57c5haahB
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1