General

  • Target

    NEAS.ed5d38afd49952cab041d090e12eaa40.exe

  • Size

    4.2MB

  • Sample

    231112-jzbzvaec44

  • MD5

    ed5d38afd49952cab041d090e12eaa40

  • SHA1

    12740573e0900e7926d529c009141a2869ed9ec6

  • SHA256

    6fb9e8b886988a5f6203aafcf4dbb7357ed7f37516354702206a88dffce990be

  • SHA512

    54ef845b7a8243ed406cfe886cb5f466147b3c995965eb8e1fdbafa05ff1315a7569ceb216248e427cc35a492520ab2408a823fecbc8d7e3837e13c53b7d365c

  • SSDEEP

    98304:7ay4/rO+6m6Vnx+ZIoVO/VDRQk+DLLDgFEZfis2UOh:7aX/rX56VloCVDaLHgWZKs6

Malware Config

Targets

    • Target

      NEAS.ed5d38afd49952cab041d090e12eaa40.exe

    • Size

      4.2MB

    • MD5

      ed5d38afd49952cab041d090e12eaa40

    • SHA1

      12740573e0900e7926d529c009141a2869ed9ec6

    • SHA256

      6fb9e8b886988a5f6203aafcf4dbb7357ed7f37516354702206a88dffce990be

    • SHA512

      54ef845b7a8243ed406cfe886cb5f466147b3c995965eb8e1fdbafa05ff1315a7569ceb216248e427cc35a492520ab2408a823fecbc8d7e3837e13c53b7d365c

    • SSDEEP

      98304:7ay4/rO+6m6Vnx+ZIoVO/VDRQk+DLLDgFEZfis2UOh:7aX/rX56VloCVDaLHgWZKs6

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Windows security bypass

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

    • Modifies boot configuration data using bcdedit

MITRE ATT&CK Enterprise v15

Tasks