General
-
Target
5b80f3a3d3500ba8238f1950b5e2b34e14fbb9a5b1fefaaef5d129202e37c9de
-
Size
4.1MB
-
Sample
231012-v9bbvagh66
-
MD5
95d6b187f415d2ba778a96e1bda7b421
-
SHA1
8afeb6e4c212a2e81c4d9715d4489ba20a1f2146
-
SHA256
5b80f3a3d3500ba8238f1950b5e2b34e14fbb9a5b1fefaaef5d129202e37c9de
-
SHA512
41ea26ed18a412388d6a9399d60e61f269d972d0cf3da86bff3dbecca3965238a616da8839e257170bcc7d3b8c1f2790194ef196159b31b134d3b96cc2654ad5
-
SSDEEP
98304:wiYpD7ABWHfjkisjoq01OQsKrLerxYq0oQODwhuTXBLjlqGE:cRAs/jkisjov1sNrxYqJLDwh0X3o
Static task
static1
Behavioral task
behavioral1
Sample
5b80f3a3d3500ba8238f1950b5e2b34e14fbb9a5b1fefaaef5d129202e37c9de.exe
Resource
win7-20230831-en
Malware Config
Targets
-
-
Target
5b80f3a3d3500ba8238f1950b5e2b34e14fbb9a5b1fefaaef5d129202e37c9de
-
Size
4.1MB
-
MD5
95d6b187f415d2ba778a96e1bda7b421
-
SHA1
8afeb6e4c212a2e81c4d9715d4489ba20a1f2146
-
SHA256
5b80f3a3d3500ba8238f1950b5e2b34e14fbb9a5b1fefaaef5d129202e37c9de
-
SHA512
41ea26ed18a412388d6a9399d60e61f269d972d0cf3da86bff3dbecca3965238a616da8839e257170bcc7d3b8c1f2790194ef196159b31b134d3b96cc2654ad5
-
SSDEEP
98304:wiYpD7ABWHfjkisjoq01OQsKrLerxYq0oQODwhuTXBLjlqGE:cRAs/jkisjov1sNrxYqJLDwh0X3o
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1