General

  • Target

    e0cbefcb1af40c7d4aff4aca26621a98.exe

  • Size

    4.1MB

  • Sample

    231013-jvsrsshf99

  • MD5

    acc4373690f1dfc65694b0945f741428

  • SHA1

    4aa25e0324d1af40c4e8f2f799d29fd6e43f3899

  • SHA256

    e21a0127cf80b2276660b21a862cffbe52add050c44e382143168eab5789f3c5

  • SHA512

    a359007de6025fbbc9bffef818814b23f5ff580c79a7ba5bbf6ab827e72d5110d75a587a0c986431320f7be81ed52810d7d8aee7bfbc2533f52e144d65cf749d

  • SSDEEP

    98304:7bZwNMOyYTaUs7+TVUsw2NKTL6Pa2dsUND:h6zyxMU72NaLerJ

Malware Config

Targets

    • Target

      e0cbefcb1af40c7d4aff4aca26621a98.exe

    • Size

      4.1MB

    • MD5

      acc4373690f1dfc65694b0945f741428

    • SHA1

      4aa25e0324d1af40c4e8f2f799d29fd6e43f3899

    • SHA256

      e21a0127cf80b2276660b21a862cffbe52add050c44e382143168eab5789f3c5

    • SHA512

      a359007de6025fbbc9bffef818814b23f5ff580c79a7ba5bbf6ab827e72d5110d75a587a0c986431320f7be81ed52810d7d8aee7bfbc2533f52e144d65cf749d

    • SSDEEP

      98304:7bZwNMOyYTaUs7+TVUsw2NKTL6Pa2dsUND:h6zyxMU72NaLerJ

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks