General
-
Target
03d3e8846b3039926f032af29e40315c112eddd52a833a3843c8dc35a2cbaa90
-
Size
4.1MB
-
Sample
231014-amck6shc39
-
MD5
2b7ef13627ef49d7b7176db4cb754e4f
-
SHA1
64b9bcae13f5cb499678505e265dc042ad0db67d
-
SHA256
03d3e8846b3039926f032af29e40315c112eddd52a833a3843c8dc35a2cbaa90
-
SHA512
f72fbcdea719a12c6918018ebc292405466eaaa189dcb28e968ab5caf423d9b32d541e85e9cac90bd93a90a982dbcd2794bdadb7f5446d5df2a1a2146c3f5746
-
SSDEEP
98304:QuSuM32g4Ei/8o77WHW17i8MtjMpMuOlUtbvkxC7e8SdEyFUW:Al32g4Eit7C2qaMQbkxC6BdT/
Static task
static1
Behavioral task
behavioral1
Sample
03d3e8846b3039926f032af29e40315c112eddd52a833a3843c8dc35a2cbaa90.exe
Resource
win7-20230831-en
Malware Config
Targets
-
-
Target
03d3e8846b3039926f032af29e40315c112eddd52a833a3843c8dc35a2cbaa90
-
Size
4.1MB
-
MD5
2b7ef13627ef49d7b7176db4cb754e4f
-
SHA1
64b9bcae13f5cb499678505e265dc042ad0db67d
-
SHA256
03d3e8846b3039926f032af29e40315c112eddd52a833a3843c8dc35a2cbaa90
-
SHA512
f72fbcdea719a12c6918018ebc292405466eaaa189dcb28e968ab5caf423d9b32d541e85e9cac90bd93a90a982dbcd2794bdadb7f5446d5df2a1a2146c3f5746
-
SSDEEP
98304:QuSuM32g4Ei/8o77WHW17i8MtjMpMuOlUtbvkxC7e8SdEyFUW:Al32g4Eit7C2qaMQbkxC6BdT/
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1