General
-
Target
tmp
-
Size
6.4MB
-
Sample
231126-zh6e5acd2x
-
MD5
faa78f58b4f091f8c56ea622d8576703
-
SHA1
2bd05e7cf298f79bc7408f400e2f2fd37fc8bdf1
-
SHA256
464c7ab944886103d617e334c94320344761a543de5395c6b541ae386b448ea0
-
SHA512
3037aef0866b9957fd9f56691baa0e6557a9f46cd3695016dc3c829fc270393360b05e39fba19dc10cac06c2f51998716b3c15c57c3f0afe8c11b2a3709d467b
-
SSDEEP
196608:AR4ERFw+DIaY5cI1CmjxOSdKk7lpv3/4AkRKM:ARxR9Y5cI1CmVtVpvgL
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231023-en
Malware Config
Targets
-
-
Target
tmp
-
Size
6.4MB
-
MD5
faa78f58b4f091f8c56ea622d8576703
-
SHA1
2bd05e7cf298f79bc7408f400e2f2fd37fc8bdf1
-
SHA256
464c7ab944886103d617e334c94320344761a543de5395c6b541ae386b448ea0
-
SHA512
3037aef0866b9957fd9f56691baa0e6557a9f46cd3695016dc3c829fc270393360b05e39fba19dc10cac06c2f51998716b3c15c57c3f0afe8c11b2a3709d467b
-
SSDEEP
196608:AR4ERFw+DIaY5cI1CmjxOSdKk7lpv3/4AkRKM:ARxR9Y5cI1CmVtVpvgL
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1