General
-
Target
a000684c9fcd2d5a528161a3513f726b2307fa6b50788a568fec0930b452d59e
-
Size
4.1MB
-
Sample
231015-2a5jzacf69
-
MD5
8627c70b06ccae7c64acdd10a0d5d0ae
-
SHA1
fd87db535189654374d269e59ff1dd62020e4464
-
SHA256
a000684c9fcd2d5a528161a3513f726b2307fa6b50788a568fec0930b452d59e
-
SHA512
a4ba244cc35acd7be1a75239d0d6e148a0fd46d8fb09d650ccffc00c4e5f891b0810a316b28f08f1f2a19b2fdcb9097bcba5a6fe04c39a7d83e4dcf194dfdd99
-
SSDEEP
98304:yLyb54rAVQD2esiID+dc0iOuFInEXs7kxS8It7QwMthknMlW6:y054wQD2znD21nu21kkMlf
Static task
static1
Behavioral task
behavioral1
Sample
a000684c9fcd2d5a528161a3513f726b2307fa6b50788a568fec0930b452d59e.exe
Resource
win7-20230831-en
Malware Config
Targets
-
-
Target
a000684c9fcd2d5a528161a3513f726b2307fa6b50788a568fec0930b452d59e
-
Size
4.1MB
-
MD5
8627c70b06ccae7c64acdd10a0d5d0ae
-
SHA1
fd87db535189654374d269e59ff1dd62020e4464
-
SHA256
a000684c9fcd2d5a528161a3513f726b2307fa6b50788a568fec0930b452d59e
-
SHA512
a4ba244cc35acd7be1a75239d0d6e148a0fd46d8fb09d650ccffc00c4e5f891b0810a316b28f08f1f2a19b2fdcb9097bcba5a6fe04c39a7d83e4dcf194dfdd99
-
SSDEEP
98304:yLyb54rAVQD2esiID+dc0iOuFInEXs7kxS8It7QwMthknMlW6:y054wQD2znD21nu21kkMlf
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1