General

  • Target

    40790c741512722a0a45db61bb1153a55142865ad4829a0498eba1c2637c7c00

  • Size

    4.1MB

  • Sample

    231103-zalezsca53

  • MD5

    d719586593e16675623a58c1a5619ec8

  • SHA1

    5bb0ff88ba6968c80ca2fa38b3208d4319f3cd06

  • SHA256

    40790c741512722a0a45db61bb1153a55142865ad4829a0498eba1c2637c7c00

  • SHA512

    e147f8f80e76c75d52bcda645ab8611e23702a42cd05c530c8cc58d6fe06259f3c10b1a7258eaafdf3ff78690c1fc90601b74303ec28ad79f3b99bbc9af03b64

  • SSDEEP

    98304:cihWAbYk3XjesXqx9Ls3V+r8KFMheZa+1KJWkQ:coWSTe/Ls3V+r8KShe3IgkQ

Malware Config

Targets

    • Target

      40790c741512722a0a45db61bb1153a55142865ad4829a0498eba1c2637c7c00

    • Size

      4.1MB

    • MD5

      d719586593e16675623a58c1a5619ec8

    • SHA1

      5bb0ff88ba6968c80ca2fa38b3208d4319f3cd06

    • SHA256

      40790c741512722a0a45db61bb1153a55142865ad4829a0498eba1c2637c7c00

    • SHA512

      e147f8f80e76c75d52bcda645ab8611e23702a42cd05c530c8cc58d6fe06259f3c10b1a7258eaafdf3ff78690c1fc90601b74303ec28ad79f3b99bbc9af03b64

    • SSDEEP

      98304:cihWAbYk3XjesXqx9Ls3V+r8KFMheZa+1KJWkQ:coWSTe/Ls3V+r8KShe3IgkQ

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Windows security bypass

    • Modifies Windows Firewall

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks