General

  • Target

    03d3e8846b3039926f032af29e40315c112eddd52a833a3843c8dc35a2cbaa90

  • Size

    4.1MB

  • Sample

    231014-amck6shc39

  • MD5

    2b7ef13627ef49d7b7176db4cb754e4f

  • SHA1

    64b9bcae13f5cb499678505e265dc042ad0db67d

  • SHA256

    03d3e8846b3039926f032af29e40315c112eddd52a833a3843c8dc35a2cbaa90

  • SHA512

    f72fbcdea719a12c6918018ebc292405466eaaa189dcb28e968ab5caf423d9b32d541e85e9cac90bd93a90a982dbcd2794bdadb7f5446d5df2a1a2146c3f5746

  • SSDEEP

    98304:QuSuM32g4Ei/8o77WHW17i8MtjMpMuOlUtbvkxC7e8SdEyFUW:Al32g4Eit7C2qaMQbkxC6BdT/

Malware Config

Targets

    • Target

      03d3e8846b3039926f032af29e40315c112eddd52a833a3843c8dc35a2cbaa90

    • Size

      4.1MB

    • MD5

      2b7ef13627ef49d7b7176db4cb754e4f

    • SHA1

      64b9bcae13f5cb499678505e265dc042ad0db67d

    • SHA256

      03d3e8846b3039926f032af29e40315c112eddd52a833a3843c8dc35a2cbaa90

    • SHA512

      f72fbcdea719a12c6918018ebc292405466eaaa189dcb28e968ab5caf423d9b32d541e85e9cac90bd93a90a982dbcd2794bdadb7f5446d5df2a1a2146c3f5746

    • SSDEEP

      98304:QuSuM32g4Ei/8o77WHW17i8MtjMpMuOlUtbvkxC7e8SdEyFUW:Al32g4Eit7C2qaMQbkxC6BdT/

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks