General
-
Target
14cf4c3984cdb65f8d944fb2b0a40f036af4c7a9ee3f5c31fedc1a253f281377
-
Size
4.1MB
-
Sample
240204-jfexdsehcr
-
MD5
093c94ca1bd4cf7a7d9e00a2d16e13e0
-
SHA1
22b9c0f1e9baaa63c7147da74ffaebae0a1a788b
-
SHA256
14cf4c3984cdb65f8d944fb2b0a40f036af4c7a9ee3f5c31fedc1a253f281377
-
SHA512
4abe8d20879afb8ebec8b43825bb4c671cd9812e5923af89c252a9f24fdfd231e9643ecc4e3a4055c7ac9c8b38d80322b2e5570b7393b1ad2cf421e2330d9a4a
-
SSDEEP
98304:SbCoVinoDwbZ9Tzoy68jAteqMEUlOBtAXCS6tC5bOa:SHVioc7cyAsbryS6t6B
Static task
static1
Behavioral task
behavioral1
Sample
14cf4c3984cdb65f8d944fb2b0a40f036af4c7a9ee3f5c31fedc1a253f281377.exe
Resource
win7-20231129-en
Malware Config
Targets
-
-
Target
14cf4c3984cdb65f8d944fb2b0a40f036af4c7a9ee3f5c31fedc1a253f281377
-
Size
4.1MB
-
MD5
093c94ca1bd4cf7a7d9e00a2d16e13e0
-
SHA1
22b9c0f1e9baaa63c7147da74ffaebae0a1a788b
-
SHA256
14cf4c3984cdb65f8d944fb2b0a40f036af4c7a9ee3f5c31fedc1a253f281377
-
SHA512
4abe8d20879afb8ebec8b43825bb4c671cd9812e5923af89c252a9f24fdfd231e9643ecc4e3a4055c7ac9c8b38d80322b2e5570b7393b1ad2cf421e2330d9a4a
-
SSDEEP
98304:SbCoVinoDwbZ9Tzoy68jAteqMEUlOBtAXCS6tC5bOa:SHVioc7cyAsbryS6t6B
-
Glupteba payload
-
XMRig Miner payload
-
Modifies boot configuration data using bcdedit
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1