General
-
Target
JC_73eb30c31501b630adcf23d358352c8e848f702481e4e110cd7e16fbbe36c146
-
Size
4.2MB
-
Sample
231013-c8phzabc4x
-
MD5
d34d6dc3bdc1bc97c00b736e29f2faab
-
SHA1
d126fcd93aa46fbf48d17f626fa5575d6b8ed9b3
-
SHA256
73eb30c31501b630adcf23d358352c8e848f702481e4e110cd7e16fbbe36c146
-
SHA512
f6e74511a5723140b39f20d88a95f435ca73b9910c81abb6865b8e94e5ad78b1d845730f300860f7248a85d5123f964b1e8346e6247ba088690119ab3b02d00b
-
SSDEEP
98304:v2LSaMsua00GVP4yTqyN9qqOwAlVOkMhr2c+PXxYGrYCnb5iVpl:uSaMsn00OaEsJO3hCc+PrbkB
Static task
static1
Behavioral task
behavioral1
Sample
JC_73eb30c31501b630adcf23d358352c8e848f702481e4e110cd7e16fbbe36c146.exe
Resource
win7-20230831-en
Malware Config
Targets
-
-
Target
JC_73eb30c31501b630adcf23d358352c8e848f702481e4e110cd7e16fbbe36c146
-
Size
4.2MB
-
MD5
d34d6dc3bdc1bc97c00b736e29f2faab
-
SHA1
d126fcd93aa46fbf48d17f626fa5575d6b8ed9b3
-
SHA256
73eb30c31501b630adcf23d358352c8e848f702481e4e110cd7e16fbbe36c146
-
SHA512
f6e74511a5723140b39f20d88a95f435ca73b9910c81abb6865b8e94e5ad78b1d845730f300860f7248a85d5123f964b1e8346e6247ba088690119ab3b02d00b
-
SSDEEP
98304:v2LSaMsua00GVP4yTqyN9qqOwAlVOkMhr2c+PXxYGrYCnb5iVpl:uSaMsn00OaEsJO3hCc+PrbkB
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1