General
-
Target
17cb7a01526ff294e454e1dfa22035d5f50fe296a03dbbf5470ce11b43cec8ec
-
Size
4.2MB
-
Sample
231013-fqfpwseh9v
-
MD5
ee29fda58a52b059c002c4913d87179b
-
SHA1
9460aae379f6bc820360c7cf615d7e648d2a470c
-
SHA256
17cb7a01526ff294e454e1dfa22035d5f50fe296a03dbbf5470ce11b43cec8ec
-
SHA512
0122d214201b1977247fa42c23871b31b3154838eded8c4be0b864a46fa36233322c0757c19edf334b1bfa4dbef72ee250177aa32caab436ba97b968cfd07193
-
SSDEEP
98304:b/CKrjXl5mXZh8/f5G4pbp4l/41Uy7ZE9TJZo2jBPDSIE51GEa1X2:jFrj788n5GC4t41/aTJjVDS/1NaN2
Static task
static1
Behavioral task
behavioral1
Sample
17cb7a01526ff294e454e1dfa22035d5f50fe296a03dbbf5470ce11b43cec8ec.exe
Resource
win7-20230831-en
Malware Config
Targets
-
-
Target
17cb7a01526ff294e454e1dfa22035d5f50fe296a03dbbf5470ce11b43cec8ec
-
Size
4.2MB
-
MD5
ee29fda58a52b059c002c4913d87179b
-
SHA1
9460aae379f6bc820360c7cf615d7e648d2a470c
-
SHA256
17cb7a01526ff294e454e1dfa22035d5f50fe296a03dbbf5470ce11b43cec8ec
-
SHA512
0122d214201b1977247fa42c23871b31b3154838eded8c4be0b864a46fa36233322c0757c19edf334b1bfa4dbef72ee250177aa32caab436ba97b968cfd07193
-
SSDEEP
98304:b/CKrjXl5mXZh8/f5G4pbp4l/41Uy7ZE9TJZo2jBPDSIE51GEa1X2:jFrj788n5GC4t41/aTJjVDS/1NaN2
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1